@ -19,7 +19,9 @@ Refer to the [ACL system workflow overview](/docs/security/acl/acl-system#workfl
The person responsible for administrating ACLs can use the API or CLI to create and link tokens to entities that enable permissions to resources.
Refer to the [ACL API](/api-docs/acl) and [ACL CLI](/commands/acl) documentation for instructions on how to create and link tokens. Tokens can also be created dynamically from trusted external system using an
[auth method](/docs/security/acl/auth-methods). Additionally, a tutorial is available to help you get started with creating tokens. Visit the the [Secure Consul with Access Control Lists (ACLs) tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production?in=consul/security) to learn more through an interactive sandbox environment.
[auth method](/docs/security/acl/auth-methods).
Refer to the [Secure Consul with Access Control Lists (ACLs)](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production?in=consul/security) tutorial for help getting started with creating tokens. The tutorial includes an interactive sandbox so that you can perform the procedures without configuring your local environment.