diff --git a/docs/config.json b/docs/config.json
index d60b757dbf99a..87184f52eb603 100644
--- a/docs/config.json
+++ b/docs/config.json
@@ -346,7 +346,7 @@
{
"title": "Login Rules",
"slug": "/access-controls/login-rules/",
- "forScopes": ["enterprise", "oss", "cloud"],
+ "forScopes": ["enterprise", "cloud"],
"entries": [
{
"title": "Set Up Login Rules",
@@ -362,6 +362,11 @@
"title": "Terraform",
"slug": "/access-controls/login-rules/terraform/",
"forScopes": ["enterprise", "cloud"]
+ },
+ {
+ "title": "Kubernetes Operator",
+ "slug": "/access-controls/login-rules/kubernetes/",
+ "forScopes": ["enterprise"]
}
]
},
diff --git a/docs/cspell.json b/docs/cspell.json
index 112550263120e..4cb2489103dc1 100644
--- a/docs/cspell.json
+++ b/docs/cspell.json
@@ -442,6 +442,7 @@
"localca",
"loginerrortroubleshooting",
"loginrule",
+ "loginrules",
"loginuid",
"loginwithmsft",
"logrus",
diff --git a/docs/pages/access-controls/login-rules.mdx b/docs/pages/access-controls/login-rules.mdx
index 4ac3487795554..807c03fc00ca7 100644
--- a/docs/pages/access-controls/login-rules.mdx
+++ b/docs/pages/access-controls/login-rules.mdx
@@ -10,7 +10,8 @@ layout: tocless-doc
When users log in to your Teleport cluster with a configured SSO provider,
**Login Rules** can transform the traits provided by your IdP to meet your needs
-for configuring access within Teleport. Login Rules are available starting
+for configuring access within Teleport.
+Login Rules are a feature of Teleport Enterprise and they are available starting
from Teleport `v11.3.1`.
Some use cases for Login Rules are:
diff --git a/docs/pages/access-controls/login-rules/kubernetes.mdx b/docs/pages/access-controls/login-rules/kubernetes.mdx
new file mode 100644
index 0000000000000..16cbe2520bedd
--- /dev/null
+++ b/docs/pages/access-controls/login-rules/kubernetes.mdx
@@ -0,0 +1,256 @@
+---
+title: Deploy Login Rules using Kubernetes Operator (Preview)
+description: Use Teleport's Kubernetes Operator to deploy Login Rules to your cluster
+---
+
+
+ Login Rules and the Teleport Kubernetes Operator are currently in Preview mode.
+
+
+This guide will explain how to:
+
+- Use Teleport's Kubernetes Operator to deploy Login Rules to your Teleport cluster
+- Edit deployed Login Rules with `kubectl`
+
+This guide is applicable if you self-host Teleport in Kubernetes using the
+`teleport-cluster` Helm chart.
+
+## Prerequisites
+
+- A Teleport Enterprise license
+
+- A Kubernetes cluster (with or without `teleport-cluster` Helm chart already deployed)
+
+- [Helm](https://helm.sh/docs/intro/quickstart/)
+
+- [kubectl](https://kubernetes.io/docs/tasks/tools/)
+
+- Validate Kubernetes connectivity by running the following command:
+
+ ```code
+ $ kubectl cluster-info
+ # Kubernetes control plane is running at https://127.0.0.1:6443
+ # CoreDNS is running at https://127.0.0.1:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy
+ ```
+
+
+ Users wanting to experiment locally with the Operator can use [minikube](https://minikube.sigs.k8s.io/docs/start/)
+ to start a local Kubernetes cluster:
+
+ ```code
+ $ minikube start
+ ```
+
+
+
+- Follow Step 1 of the
+ [Teleport operator guide](../../management/guides/teleport-operator.mdx#step-13-install-teleport-cluster-helm-chart-with-the-operator)
+ to install the Teleport Operator in your Kubernetes cluster.
+ Make sure to follow the Enterprise instructions.
+
+ Confirm that the CRD (Custom Resource Definition) for Login Rules has been
+ installed with the following command:
+
+ ```code
+ $ kubectl explain TeleportLoginRule.spec
+ KIND: TeleportLoginRule
+ VERSION: resources.teleport.dev/v1
+
+ RESOURCE: spec