@ -78,7 +78,7 @@ such that the trustee has limited access to those
roles delegated. In addition, the trustee has effective impersonation
of the trustor user if it was selected when creating the trust.
For more information, see :keystone-doc:`Identity management trusts
Trusts authorization involves the following steps: