diff --git a/docs/platform/concepts/authentication-tokens.md b/docs/platform/concepts/authentication-tokens.md index 95057118..5bd7a11f 100644 --- a/docs/platform/concepts/authentication-tokens.md +++ b/docs/platform/concepts/authentication-tokens.md @@ -7,13 +7,13 @@ There are 3 types of tokens used to access the Aiven platform: session tokens, p Session tokens are created when you log in or make an API call. These tokens are revoked when you log out of the Aiven Console or the CLI. -You can [create personal tokens](/docs/platform/howto/create_authentication_token) to access resources instead of using your password. +You can [create personal tokens](/docs/platform/howto/create_authentication_token) to +access resources instead of using your password. Application tokens are linked to [application users](/docs/platform/concepts/application-users). Application users and tokens are a more secure option for non-human users like external applications. You can create multiple personal or application tokens for different use cases. - ## Token limits The maximum number of personal tokens that you can create is 10. Personal tokens are diff --git a/docs/platform/howto/set-authentication-policies.md b/docs/platform/howto/set-authentication-policies.md index 2da1a553..9c429d76 100644 --- a/docs/platform/howto/set-authentication-policies.md +++ b/docs/platform/howto/set-authentication-policies.md @@ -74,10 +74,12 @@ the user can create a token. ### Access from allowed IP addresses -You can restrict users to accessing the Aiven Platform from specific IP address ranges -to ensure they are coming from trusted networks. This helps you minimize exposure, reduce -the risk of breaches, and comply with policies and regulations. This also applies to -access through personal and application tokens. +You can restrict access to your organization's resources by allowing only specific IP +address ranges, ensuring connections are coming from trusted networks. This helps you +minimize exposure, reduce the risk of breaches, and comply with policies and regulations. + +This authentication policy setting also applies to access through +personal and application tokens. ## Set an authentication policy