diff --git a/content/actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners-using-groups.md b/content/actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners-using-groups.md index 305937c7d7..c0a5a87bf8 100644 --- a/content/actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners-using-groups.md +++ b/content/actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners-using-groups.md @@ -5,6 +5,7 @@ intro: You can use policies to limit access to self-hosted runners that have bee permissions: 'Enterprise accounts, organizations owned by enterprise accounts, and organizations using {% data variables.product.prodname_team %} can create and manage additional runner groups.' redirect_from: - /actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners + - /actions/hosting-your-own-runners/managing-access-to-self-hosted-runners - /actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups versions: fpt: '*'