Skip to content

Commit 55eb768

Browse files
committed
Fixups
1 parent a60c2ae commit 55eb768

5 files changed

Lines changed: 633 additions & 438 deletions

File tree

docs/admin/access_control/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can read about the specific permission types available for each RBAC-enabled
4040

4141
- [Batch Changes](/admin/access_control/batch_changes)
4242
- [Ownership](/admin/access_control/ownership)
43-
- [Service accounts](/admin/access_control/service_accounts)
43+
- [Service accounts](/admin/service_accounts)
4444

4545
### Deleting a role
4646

docs/admin/auth/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The authentication providers are configured in the [`auth.providers`](/admin/con
3131

3232
## Programmatic authentication
3333

34-
For automated systems, CI/CD pipelines, and API integrations that need to authenticate without human interaction, use [service accounts](/admin/access_control/service_accounts). Service accounts are specialized user accounts designed for automation that authenticate using access tokens rather than passwords.
34+
For automated systems, CI/CD pipelines, and API integrations that need to authenticate without human interaction, use [service accounts](/admin/service_accounts). Service accounts are specialized user accounts designed for automation that authenticate using access tokens rather than passwords.
3535

3636
## Login form configuration
3737

docs/admin/oauth_apps.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This makes OAuth the preferred choice for any multi-user integration like browse
1111

1212
OAuth Apps follow standards [RFC 6749](https://tools.ietf.org/html/rfc6749), [RFC 7636 (PKCE)](https://tools.ietf.org/html/rfc7636), and [RFC 8628 (Device Authorization Grant)](https://tools.ietf.org/html/rfc8628).
1313

14-
Consider using **M2M (client-credentials) service-account tokens** or traditional [access tokens](/admin/access_control/access_tokens) for server-to-server communication, automated scripts, CI/CD pipelines, or single-user applications that do not require per-user permission checks. See [service accounts](/admin/access_control/service_accounts#m2m-oauth-credentials-client-credentials-flow) for details.
14+
Consider using **M2M (client-credentials) service-account tokens** or traditional [access tokens](/admin/access_control/access_tokens) for server-to-server communication, automated scripts, CI/CD pipelines, or single-user applications that do not require per-user permission checks. See [service accounts](/admin/service_accounts#m2m-oauth-credentials-client-credentials-flow) for details.
1515

1616
## Creating an OAuth App
1717

docs/api/graphql/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Both authentication methods will return a response like this:
4444

4545
<Callout type="note">OAuth access tokens are always short-lived and must be refreshed using refresh tokens before expiration. Check the `expires_in` field and refresh proactively.</Callout>
4646

47-
For automated scripts, CI/CD pipelines, and production integrations, use [service accounts](/admin/access_control/service_accounts) instead of personal access tokens. Service accounts are designed specifically for programmatic API access and provide better security and audit capabilities.
47+
For automated scripts, CI/CD pipelines, and production integrations, use [service accounts](/admin/service_accounts) instead of personal access tokens. Service accounts are designed specifically for programmatic API access and provide better security and audit capabilities.
4848

4949
## Documentation & tooling
5050

0 commit comments

Comments
 (0)