From 451f7209e614779c9b28f6b52344221c85b4edf5 Mon Sep 17 00:00:00 2001 From: Paul Gottschling Date: Wed, 13 Apr 2022 17:44:46 -0400 Subject: [PATCH] Address PR feedback --- docs/pages/setup/admin/trustedclusters.mdx | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/pages/setup/admin/trustedclusters.mdx b/docs/pages/setup/admin/trustedclusters.mdx index e5bc33c67c2e6..28ef4241dba8a 100644 --- a/docs/pages/setup/admin/trustedclusters.mdx +++ b/docs/pages/setup/admin/trustedclusters.mdx @@ -23,20 +23,20 @@ This guide will explain how to:
- If you have a large number of devices on different networks, such as managed - IoT devices, you can configure your Teleport Nodes to connect to your cluster - via Teleport Node Tunneling. Instead of connecting to the Auth Service - directly, a Node connects to the Proxy Service, and the Auth Service creates a - reverse tunnel to the Node. +If your Nodes are deployed behind a firewall or otherwise not reachable by the +Teleport Proxy Service, you can connect them to your Teleport cluster via +Teleport Node Tunneling. Instead of connection to the Auth Service directly, +each Node connects to the Proxy Service, and the Auth Service creates a reverse +tunnel to the Node. - Learn more in [Adding Nodes to the Cluster](./adding-nodes.mdx). +Learn more in [Adding Nodes to the Cluster](./adding-nodes.mdx).
## How Trusted Clusters work Teleport can partition compute infrastructure into multiple clusters. A cluster -is a group of Teleport SSH Nodes connected to the cluster's Auth Service, which +is a group of Teleport resources connected to the cluster's Auth Service, which acts as a certificate authority (CA) for all users and nodes in the cluster. To retrieve an SSH certificate, users must authenticate with a cluster through a