diff --git a/website/source/docs/auth/aws.html.md b/website/source/docs/auth/aws.html.md index ff82c2b79a..0911d510c4 100644 --- a/website/source/docs/auth/aws.html.md +++ b/website/source/docs/auth/aws.html.md @@ -570,8 +570,8 @@ and EC2 instances in the target account. The account in which Vault is running (i.e. the master account) must be listed as a trusted entity in the IAM Role being assumed on the remote account. The Role itself -should allow the permissions specified in the (Recommended Vault IAM -Policy)(#recommended-vault-iam-policy) except it doesn't need any further +should allow the permissions specified in the [Recommended Vault IAM +Policy](#recommended-vault-iam-policy) except it doesn't need any further `sts:AssumeRole` permissions. Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`