doc/radosgw: Uppercase s3

Signed-off-by: Anthony D'Atri <anthonyeleven@users.noreply.github.com>
This commit is contained in:
Anthony D'Atri 2022-07-29 00:11:22 -07:00
parent ac0e45656e
commit 73f0d5707d
2 changed files with 3 additions and 3 deletions

View File

@ -110,8 +110,8 @@ Examples
radosgw-admin caps add --uid="TESTER" --caps="roles=*"
2. The following is an example of AssumeRole API call, which shows steps to create a role, assign a policy to it
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing s3 resources using
2. The following is an example of the AssumeRole API call, which shows steps to create a role, assign a policy to it
(that allows access to S3 resources), assuming a role to get temporary credentials and accessing S3 resources using
those credentials. In this example, TESTER1 assumes a role created by TESTER, to access S3 resources owned by TESTER,
according to the permission policy attached to the role.

View File

@ -35,7 +35,7 @@ Parameters:
**TokenCode** (String/ Optional): The value provided by the MFA device, if MFA is required.
An administrative user needs to attach a policy to allow invocation of GetSessionToken API using its permanent
credentials and to allow subsequent s3 operations invocation using only the temporary credentials returned
credentials and to allow subsequent S3 operations invocation using only the temporary credentials returned
by GetSessionToken.
The user attaching the policy needs to have admin caps. For example::