diff --git a/pages/doc/2023-52.x_release_notes.md b/pages/doc/2023-52.x_release_notes.md index f49eb707d..ed27730f4 100644 --- a/pages/doc/2023-52.x_release_notes.md +++ b/pages/doc/2023-52.x_release_notes.md @@ -40,7 +40,7 @@ Example: An annotated screenshot of the create traces security policy for origin ### Onboarded Subscriptions -**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#operations-for-applications-permissions) and [service role](csp_users_roles.html#operations-for-applications-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings. +**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#tanzu-observability-permissions) and [service role](csp_users_roles.html#tanzu-observability-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings. ### Original and Onboarded Subscriptions diff --git a/pages/doc/csp_api_tokens.md b/pages/doc/csp_api_tokens.md index d5d181f41..bb55112c4 100644 --- a/pages/doc/csp_api_tokens.md +++ b/pages/doc/csp_api_tokens.md @@ -92,7 +92,7 @@ To generate and manage the API tokens for an existing **service account**: As a user with the **Admin** service role, you can view and revoke the API tokens of any service account in your service instance. -{% include warning.html content="If your original Tanzu Observability subscription was onboarded to VMware Cloud services, for backward compatibility, you might have some legacy Tanzu Observability API tokens that are associated with user accounts. It’s recommended that you incrementally [replace them with VMware Cloud services API tokens](csp_migration.html#how-to-replace-an-tanzu-observability-api-token-with-a-vmware-cloud-services-access-token)."%} +{% include warning.html content="If your original Tanzu Observability subscription was onboarded to VMware Cloud services, for backward compatibility, you might have some legacy Tanzu Observability API tokens that are associated with user accounts. It’s recommended that you incrementally [replace them with VMware Cloud services API tokens](csp_migration.html#how-to-replace-a-tanzu-observability-api-token-with-a-vmware-cloud-services-access-token)."%} 1. Log in to your service instance as an **Admin** user. 2. Click the gear icon on the toolbar and select **Accounts**. diff --git a/pages/doc/csp_area_differences.md b/pages/doc/csp_area_differences.md index 6b8ae6ccb..54ef04975 100644 --- a/pages/doc/csp_area_differences.md +++ b/pages/doc/csp_area_differences.md @@ -161,7 +161,7 @@ Last sentence: Тo temporarily enable service accounts for your service instance For original subscriptions, using the Tanzu Observability REST API requires an API token associated with a user account or a service account. To generate API tokens for your user account you need the **API Tokens** permission. To generate API tokens for service accounts and to manage the API tokens in your Tanzu Observability organization, you need the **Accounts** permission. -When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can: +When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can: * Generate a VMware Cloud services API token associated with your user account and exchange it for an access token. @@ -366,7 +366,7 @@ For details, see Manage API Tokens.

@@ -425,7 +425,7 @@ For details, see Manage API Tokens.

Where: In the Tanzu Observability user interface.

How: As a user with the Proxies permission, you must configure the proxy to authenticate to Tanzu Observability with a Tanzu Observability API token that have the Proxies permission. For details, see Install a Proxy from the UI.

-Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations. +Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations.

Who: