Skip to content

corrected the hyperlink for component certs #362

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 7, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion migration/nonRBACToRBAC/mtlsLdap/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ exit
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.


## Deploy configuration secrets
Expand Down
2 changes: 1 addition & 1 deletion migration/nonRBACToRBAC/mtlsOAuth/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ kubectl get pods -n confluent
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.


## Deploy configuration secrets
Expand Down
3 changes: 1 addition & 2 deletions migration/nonRBACToRBAC/mtlsOnly/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,11 +34,10 @@ kubectl get pods -n confluent
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../../assets/certs/component-certs/README.md) to generate these certificates.


## Deploy configuration secrets

You'll use Kubernetes secrets to provide credential configurations.

With Kubernetes secrets, credential management (defining, configuring, updating)
Expand Down
2 changes: 1 addition & 1 deletion security/mds-mtls-c3-sso/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ kubectl get pods -n confluent
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.

## Deploy configuration secrets

Expand Down
2 changes: 1 addition & 1 deletion security/mds-mtls-with-vault/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -161,7 +161,7 @@ cat /tmp/fileUserPassword.txt | base64 | vault kv put /secret/fileuser.txt fileu
In this scenario, you'll configure authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.

## Deploy configuration secrets

Expand Down
2 changes: 1 addition & 1 deletion security/mtls-rbac-with-sso-oauth/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ kubectl get pods -n confluent
In this scenario, you'll configure internal authentication using the mTLS mechanism. With mTLS, Confluent components and clients use TLS certificates for authentication. The certificate has a CN that identifies the principal name.

Each Confluent component service should have its own TLS certificate. In this scenario, you'll
generate a server certificate for each Confluent component service. Follow [these instructions](../assets/certs/component-certs/README.md) to generate these certificates.
generate a server certificate for each Confluent component service. Follow [these instructions](../../assets/certs/component-certs/README.md) to generate these certificates.

## Deploy configuration secrets

Expand Down