From 318ac8bbc0b23330ec4ea409fc2988986e3d3f6e Mon Sep 17 00:00:00 2001 From: hc-github-team-secure-vault-core <82990506+hc-github-team-secure-vault-core@users.noreply.github.com> Date: Thu, 23 Mar 2023 23:24:53 -0400 Subject: [PATCH] backport of commit 14eda8a1783b22f60fd4dba1bc40c7bb46d16943 (#19740) Co-authored-by: ram-parameswaran <109940849+ram-parameswaran@users.noreply.github.com> --- website/content/api-docs/secret/aws.mdx | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/website/content/api-docs/secret/aws.mdx b/website/content/api-docs/secret/aws.mdx index 5d6093411282..e2c99fc11f84 100644 --- a/website/content/api-docs/secret/aws.mdx +++ b/website/content/api-docs/secret/aws.mdx @@ -64,7 +64,9 @@ valid AWS credentials with proper permissions. To ensure generated usernames are within length limits for both STS/IAM, the template must adequately handle both conditional cases (see [Conditional Templates](https://pkg.go.dev/text/template)). As an example, if no template - is provided the field defaults to the template: + is provided the field defaults to the template below. It is to be noted that, DisplayName is the name of the vault + authenticated user running the AWS credential generation and PolicyName is the name of the Role for which the + credential is being generated for: ``` {{ if (eq .Type "STS") }}