diff --git a/changelog/21583.txt b/changelog/21583.txt new file mode 100644 index 0000000000..f16fd383d2 --- /dev/null +++ b/changelog/21583.txt @@ -0,0 +1,3 @@ +```release-note:feature +ui: add example modal to policy form +``` \ No newline at end of file diff --git a/ui/app/components/modal-form/policy-template.hbs b/ui/app/components/modal-form/policy-template.hbs index 177b7cce0f..afcc1df42b 100644 --- a/ui/app/components/modal-form/policy-template.hbs +++ b/ui/app/components/modal-form/policy-template.hbs @@ -27,37 +27,7 @@ {{/if}} {{#if this.showExamplePolicy}} -
- {{#if (eq this.policy.policyType "acl")}} -

- ACL Policies are written in Hashicorp Configuration Language ( - HCL - ) or JSON and describe which paths in Vault a user or machine is allowed to access. Here is an example policy: -

- {{else}} -

- Role Governing Policies (RGPs) are tied to client tokens or identities which is similar to - ACL policies. They use - Sentinel - as a language framework to enable fine-grained policy decisions. -

-

- Here is an example policy that uses RGP to restrict access to the - admin - policy such that a user named James or has the - Team Lead - role can manage the - admin - policy: -

- {{/if}} -
- + {{else}}