diff --git a/website/source/api/auth/aws/index.html.md b/website/source/api/auth/aws/index.html.md index b35a06d51..f3748eb87 100644 --- a/website/source/api/auth/aws/index.html.md +++ b/website/source/api/auth/aws/index.html.md @@ -361,15 +361,14 @@ $ curl \ Returns the previously configured STS role. -| Method | Path | Produces | -| :------- | :--------------------------- | :--------------------- | -| `GET` | `/auth/aws/config/sts/:account_id` | `200 application/json` | +| Method | Path | Produces | +| :------- | :--------------------------------- | :--------------------- | +| `GET` | `/auth/aws/config/sts/:account_id` | `200 application/json` | ### Parameters -- `account_id` `(string: )` - AWS account ID to be associated with - STS role. If set, Vault will use assumed credentials to verify any login - attempts from EC2 instances in this account. +- `account_id` `(string: )` - AWS account ID that has been + previously associated with STS role. ### Sample Request @@ -423,9 +422,14 @@ $ curl \ Deletes a previously configured AWS account/STS role association. -| Method | Path | Produces | -| :------- | :--------------------------- | :--------------------- | -| `DELETE` | `/auth/aws/config/sts` | `204 (empty body)` | +| Method | Path | Produces | +| :------- | :--------------------------------- | :------------------| +| `DELETE` | `/auth/aws/config/sts/:account_id` | `204 (empty body)` | + +### Parameters + +- `account_id` `(string: )` - AWS account ID that has been + previously associated with STS role. ### Sample Request @@ -433,7 +437,7 @@ Deletes a previously configured AWS account/STS role association. $ curl \ --header "X-Vault-Token: ..." \ --request DELETE \ - http://127.0.0.1:8200/v1/auth/aws/config/sts + http://127.0.0.1:8200/v1/auth/aws/config/sts/111122223333 ``` ## Configure Identity Whitelist Tidy Operation