Skip to content

Commit 2e550a1

Browse files
committed
Fix issues breaking the build
Signed-off-by: Dan Barr <6922515+danbarr@users.noreply.github.com>
1 parent be9ea32 commit 2e550a1

File tree

6 files changed

+22
-28
lines changed

6 files changed

+22
-28
lines changed

docs/toolhive/_partials/_basic-cedar-config.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,5 +24,9 @@ format:
2424
You can also define custom resource attributes in `entities_json` for per-tool
2525
ownership or sensitivity labels.
2626

27-
> For more policy examples and advanced usage, see
28-
> [Cedar policies](../concepts/cedar-policies.md).
27+
:::tip
28+
29+
For more policy examples and advanced usage, see
30+
[Cedar policies](../concepts/cedar-policies.md).
31+
32+
:::

docs/toolhive/_partials/_oidc-prerequisites.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ From your identity provider, you'll need:
1313
- Issuer URL
1414
- JWKS URL (for key verification)
1515

16-
> ToolHive uses OIDC to connect to your existing identity provider, so you can
17-
> authenticate with your own credentials (for example, Google login) or with
18-
> service account tokens (for example, in Kubernetes). ToolHive never sees your
19-
> password, only signed tokens from your identity provider.
16+
ToolHive uses OIDC to connect to your existing identity provider, so you can
17+
authenticate with your own credentials (for example, Google login) or with
18+
service account tokens (for example, in Kubernetes). ToolHive never sees your
19+
password, only signed tokens from your identity provider.
2020

2121
For background on authentication, authorization, and Cedar policy examples, see
2222
[Authentication and authorization framework](../concepts/auth-framework.md).

docs/toolhive/concepts/auth-framework.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,4 +255,4 @@ requirements.
255255
## Related information
256256

257257
- For detailed policy writing guidance, see
258-
[Cedar policies](./cedar-policies.mdcedar-policies.md)
258+
[Cedar policies](./cedar-policies.md)

docs/toolhive/concepts/authentication-authorization.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,6 @@ This document explains the concepts behind ToolHive's authentication and
99
authorization framework, which secures MCP servers by verifying client identity
1010
and controlling access to resources.
1111

12-
> For step-by-step setup and troubleshooting, see
13-
> [Securing MCP servers with authentication and authorization](../how-to/authentication-authorization.md).
14-
1512
## Understanding authentication vs. authorization
1613

1714
When you secure MCP servers, it's critical to understand the strong separation
@@ -343,12 +340,10 @@ This restricts access based on the client's location.
343340

344341
## Related information
345342

346-
- For practical steps to configure authentication and authorization, see
347-
[Authentication and authorization](../how-to/authentication-authorization.md)
348-
- For security best practices, see
349-
[Security reference](../reference/security.md)
350-
- For container security details, see
351-
[Container security model](container-security-model.md)
343+
- For configuration and setup with the ToolHive CLI, see
344+
[Authentication and authorization](../guides-cli/auth.mdx)
345+
- For Kubernetes deployment, see
346+
[Authentication and authorization in Kubernetes](../guides-k8s/auth-k8s.mdx)
352347
- For detailed Cedar policy syntax, see
353348
[Cedar documentation](https://docs.cedarpolicy.com/)
354349

docs/toolhive/concepts/cedar-policies.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -169,15 +169,15 @@ security requirements.
169169
JWT claims from your identity provider become available in policies with a
170170
`claim_` prefix. You can use these claims in two ways:
171171

172-
### On the principal entity
172+
**On the principal entity:**
173173

174174
```text
175175
permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
176176
principal.claim_name == "John Doe"
177177
};
178178
```
179179

180-
### In the context
180+
**In the context:**
181181

182182
```text
183183
permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
@@ -193,15 +193,15 @@ readable.
193193
Tool arguments become available in policies with an `arg_` prefix. This lets you
194194
create policies based on the specific parameters of requests:
195195

196-
### On the resource entity
196+
**On the resource entity:**
197197

198198
```text
199199
permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
200200
resource.arg_location == "New York" || resource.arg_location == "London"
201201
};
202202
```
203203

204-
### In the context
204+
**In the context:**
205205

206206
```text
207207
permit(principal, action == Action::"call_tool", resource == Tool::"weather") when {
@@ -407,5 +407,3 @@ When policies don't work as expected, follow this systematic approach:
407407
[Authentication and authorization framework](./auth-framework.md)
408408
- For detailed Cedar policy syntax, see
409409
[Cedar documentation](https://docs.cedarpolicy.com/)
410-
411-
<!-- markdownlint-disable-file MD024 -->

docs/toolhive/guides-k8s/auth-k8s.mdx

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -373,12 +373,9 @@ kubectl logs -n toolhive-system -l app.kubernetes.io/name=weather-server-k8s
373373
- For conceptual understanding, see
374374
[Authentication and authorization framework](../concepts/auth-framework.md)
375375
- For detailed Cedar policy syntax, see
376-
[Cedar policies](../concepts/cedar-policies.md)
377-
- For CLI deployment, see
378-
[Secure MCP servers with authentication and authorization](../how-to/auth.mdx)
376+
[Cedar policies](../concepts/cedar-policies.md) and the
377+
[Cedar documentation](https://docs.cedarpolicy.com/)
379378
- For running MCP servers without authentication, see
380-
[Run MCP servers in Kubernetes](./run-mcp-k8s.md)
379+
[Run MCP servers in Kubernetes](./run-mcp-k8s.mdx)
381380
- For ToolHive Operator installation, see
382381
[Deploy the ToolHive Operator with Helm](./deploy-operator-helm.md)
383-
- For detailed Cedar policy syntax, see
384-
[Cedar documentation](https://docs.cedarpolicy.com/)

0 commit comments

Comments
 (0)