diff --git a/website/source/docs/auth/aws-ec2.html.md b/website/source/docs/auth/aws-ec2.html.md index 60034dc39..6d328a941 100644 --- a/website/source/docs/auth/aws-ec2.html.md +++ b/website/source/docs/auth/aws-ec2.html.md @@ -40,11 +40,11 @@ security, as detailed later in this documentation. ## Authorization Workflow -The basic mechanism of operaion is per-role. Roles are registered in the -backend and associated with various optional restricitons, such as the set +The basic mechanism of operation is per-role. Roles are registered in the +backend and associated with various optional restrictions, such as the set of allowed policies and max TTLs on the generated tokens. Each role can -be specified with the contraints that are to be met during the login. For -example, currently the contraint that is supported is to bind against AMI +be specified with the constraints that are to be met during the login. For +example, currently the constraint that is supported is to bind against AMI ID. A role which is bound to a specific AMI, can only be used for login by those instances that are deployed on the same AMI. @@ -54,7 +54,7 @@ role entry in the backend can also be associated with a "role tag". These tags are generated by the backend and are placed as the value of a tag with the given key on the EC2 instance. The role tag can be used to further restrict the parameters set on the role, but cannot be used to grant additional privileges. -If a role with AMI bound contraint, has "role tag" enabled on the role, and +If a role with AMI bound constraint, has "role tag" enabled on the role, and the EC2 instance performing login does not have an expected tag on it, or if the tag on the instance is deleted for some reason, authentication fails. @@ -791,7 +791,7 @@ The response will be in JSON. For example: