Skip to content

Commit

Permalink
docs: Update titles
Browse files Browse the repository at this point in the history
  • Loading branch information
Dan-Heath committed Nov 13, 2024
1 parent 612a17e commit 90c489e
Show file tree
Hide file tree
Showing 19 changed files with 19 additions and 19 deletions.
2 changes: 1 addition & 1 deletion website/content/docs/configuration/controller.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Controller - configuration
page_title: Controller configuration
description: >-
Learn about configuring controller-specific parameters. Understand how to configure the required KMS stanzas, and view a complete configuration example.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Configure credentials with Boundary
page_title: Credential management with Boundary
description: >-
Credential stores let you store and manage credentials in Boundary. Learn about configuring user workflows with credential management or credential injection.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/index.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Overview/top-level parameters
page_title: Top-level configuration parameters
description: >-
Learn about the parameters that make up the Boundary HCL configuration file. View parameters for HCP and self-managed installations.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/aead.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: AEAD - configuration
page_title: AEAD KMS configuration
description: >-
Learn about using the Authenticated Encryption with Associated Data (AEAD) KMS for key management. AEAD is typically used for development workflows or testing.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/alicloudkms.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: AliCloud KMS - KMSs - configuration
page_title: AliCloud KMS configuration
description: >-
Learn about using the AliCloud KMS for key management and configuring parameters and authentication. View an example alicloudkms configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/awskms.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: AWS KMS - KMSs - Configuration
page_title: AWS KMS Configuration
description: >-
Learn about using the AWS KMS for key management, configuring parameters and authentication, and best practices for key rotation. View an example configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/azurekeyvault.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Azure Key Vault - seals - configuration
page_title: Azure Key Vault configuration
description: >-
Learn about using the Azure Key Vault KMS for key management and configuring parameters and authentication. View an example azurekeyvault configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/gcpckms.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: GCP Cloud KMS - KMSs - configuration
page_title: GCP Cloud KMS configuration
description: >-
Learn about using the GCP Cloud KMS for key management and configuring parameters and authentication. View an example gcpkms configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/index.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: KMS - configuration
page_title: KMS configuration
description: >-
Learn about using the kms stanza to configure key management system parameters. Discover resources for learning about specific KMS technologies.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/ocikms.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: OCI KMS - KMSs - configuration
page_title: OCI KMS configuration
description: >-
Learn about using the OCI KMS for key management and configuring parameters and authentication. View an example configuration. Understand OCI KMS key rotation.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/kms/transit.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Vault Transit - seals - configuration
page_title: Vault Transit configuration
description: >-
Learn about using the Vault transit secrets engine for key management and configuring parameters and authentication. View an example Transit KMS configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/listener/index.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Listeners - configuration
page_title: Listener configuration
description: >-
Learn about TCP and Unix listener configuration settings. Understand where to change the default addresses and ports on which Boundary responds to requests.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/listener/tcp.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: TCP - listeners - configuration
page_title: TCP listener configuration
description: >-
Learn about using the TCP listener on a TCP address and port, and view configurable parameters. Understand custom response headers. View example configurations.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/listener/unix.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Unix domain socket - listeners - configuration
page_title: Unix domain socket listener configuration
description: >-
Learn about using the Unix listener on a specified Unix domain socket, and view configurable parameters. View example Unix listener configurations.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/plugins.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Plugins - configuration
page_title: Plugin configuration
description: >-
Learn about the plugin-specific parameter that configures a directory for Boundary to use for writing and executing its built-in plugins.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Overview
page_title: Session recording overview
description: >-
Learn about using session recording to audit user sessions for compliance and threat management. Understand considerations for local and remote storage.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Configure MinIO
page_title: Configure MinIO storage
description: |-
Configure MinIO as a storage provider for recorded sessions. Understand session recording and MinIO requirements. View an example configuration.
---
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Configure Amazon S3
page_title: Configure Amazon S3 storage
description: >-
Configure Amazon S3 as a storage provider for recorded sessions. Understand session recording and AWS requirements. View an example configuration.
---
Expand Down
2 changes: 1 addition & 1 deletion website/content/docs/configuration/worker/index.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
layout: docs
page_title: Worker - configuration
page_title: Worker configuration overview
description: >-
Learn about worker configuration for proxies, storage, and tags. Understand how multi-hop configurations let you chain workers together in private networks.
---
Expand Down

0 comments on commit 90c489e

Please sign in to comment.