Skip to content

Commit acae972

Browse files
authored
corrected the hyperlink for component certs (#362)
1 parent de2a520 commit acae972

File tree

6 files changed

+6
-7
lines changed

6 files changed

+6
-7
lines changed

migration/nonRBACToRBAC/mtlsLdap/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ exit
6565
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
6666

6767
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
68-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
68+
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.
6969

7070

7171
## Deploy configuration secrets

migration/nonRBACToRBAC/mtlsOAuth/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ kubectl get pods -n confluent
4646
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
4747

4848
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
49-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
49+
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.
5050

5151

5252
## Deploy configuration secrets

migration/nonRBACToRBAC/mtlsOnly/README.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,10 @@ kubectl get pods -n confluent
3434
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
3535

3636
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
37-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
37+
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.
3838

3939

4040
## Deploy configuration secrets
41-
4241
You'll use Kubernetes secrets to provide credential configurations.
4342

4443
With Kubernetes secrets, credential management (defining, configuring, updating)

security/mds-mtls-c3-sso/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ kubectl get pods -n confluent
5353
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
5454

5555
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
56-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
56+
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.
5757

5858
## Deploy configuration secrets
5959

security/mds-mtls-with-vault/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ cat /tmp/fileUserPassword.txt | base64 | vault kv put /secret/fileuser.txt fileu
161161
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
162162

163163
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
164-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
164+
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.
165165

166166
## Deploy configuration secrets
167167

security/mtls-rbac-with-sso-oauth/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ kubectl get pods -n confluent
5353
In this scenario, you'll configure internal authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.
5454

5555
Each Confluent component service should have its own TLS certificate. In this scenario, you'll
56-
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
56+
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.
5757

5858
## Deploy configuration secrets
5959

0 commit comments

Comments
 (0)