Spell fixes on Login Rules (#21853)

This commit is contained in:
Steven Martin 2023-02-14 17:47:44 -05:00 committed by GitHub
parent e30ebcf023
commit 1b5ae8c9ab
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 2 additions and 2 deletions

View file

@ -21,7 +21,7 @@ Some use cases for Login Rules are:
- When your IdP provides a large number of traits with many values, all of these
traits will be included in your user's SSH certificates and JWTs, which can
become too large for some third-party applications to handle. Login Rules can
filter out uneccessary traits and keep just the ones you need.
filter out unnecessary traits and keep just the ones you need.
- When you have multiple [Role Templates](./guides/role-templates.mdx) repeating
the same logic to combine and transform external traits, consider using Login
Rules to consolidate the logic to one place and simplify your Roles.

View file

@ -147,7 +147,7 @@ debug SSO logins and see exactly which traits are being sent by your SSO
provider and how they are being mapped by your Login Rules.
`tctl sso test` expects a connector spec.
Run the following command to debug with a connector currently intalled in your
Run the following command to debug with a connector currently installed in your
cluster.
```code