Skip to content

Commit 7a319c3

Browse files
authored
chore: fix links for OpenID Connect subject claims in README (#1695)
Updated links in README to point to the correct documentation sections for OpenID Connect subject claims.
1 parent b1257c4 commit 7a319c3

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -387,9 +387,9 @@ Without a subject (`sub`) condition, any GitHub user or repository could
387387
potentially assume the role. The subject can be scoped to a GitHub organization
388388
and repository as shown in the CloudFormation template. However, scoping it down
389389
to your org and repo may cause the role assumption to fail in some cases. See
390-
[Example subject claims](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#example-subject-claims)
390+
[Example subject claims](https://docs.github.com/en/actions/reference/security/oidc#example-subject-claims)
391391
for specific details on what the subject value will be depending on your
392-
workflow. You can also [customize your subject claim](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#customizing-the-token-claims)
392+
workflow. You can also [customize your subject claim](https://docs.github.com/en/actions/reference/security/oidc#customizing-the-token-claims)
393393
if you want full control over the information you can filter for in your trust
394394
policy. If you aren't sure what your subject (`sub`) key is, you can add the
395395
[`actions-oidc-debugger`](https://github.com/github/actions-oidc-debugger)

0 commit comments

Comments
 (0)