Skip to content

Commit a507c62

Browse files
committed
chore(docs): Typos
Signed-off-by: Hayden Roszell <hroszell@gmail.com>
1 parent a7b92ba commit a507c62

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

docsource/content.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ The Command Issuer for [cert-manager](https://cert-manager.io/) is a [Certificat
44

55
# Requirements
66

7-
Before starting, ensure that the following requirements are met:
7+
Before continuing, ensure that the following requirements are met:
88

99
- [Keyfactor Command](https://www.keyfactor.com/products/command/) >= 10.5
1010
- Command must be properly configured according to the [product docs](https://software.keyfactor.com/Core-OnPrem/Current/Content/MasterTopics/Portal.htm).
@@ -22,7 +22,7 @@ Before starting, ensure that the following requirements are met:
2222

2323
## Configuring Command
2424

25-
Command Issuer enrolls certificates by submitting a POST request to the CSR Enrollment endpoint. Before using Command Issuer, you must create or identify a Certificate Authority _and_ Certificate Template suitable for your usecase. Additionally, you should ensure that the identity used by the Issuer/ClusterIssuer has the appropriate permissions in Command.
25+
Command Issuer enrolls certificates by submitting a POST request to the Command CSR Enrollment endpoint. Before using Command Issuer, you must create or identify a Certificate Authority _and_ Certificate Template suitable for your usecase. Additionally, you should ensure that the identity used by the Issuer/ClusterIssuer has the appropriate permissions in Command.
2626

2727
1. **Create or identify a Certificate Authority**
2828

@@ -42,11 +42,11 @@ Command Issuer enrolls certificates by submitting a POST request to the CSR Enro
4242

4343
You should make careful note of the allowed Key Types and Key Sizes on the Certificate Template. When creating cert-manager [Certificates](https://cert-manager.io/docs/usage/certificate/), you must make sure that the key `algorithm` and `size` are allowed by your Certificate Template in Command.
4444

45-
The same goes for **Subject DN Attributes** and **Other Subject Attributes** allowed by your Certificate Template. When creating cert-manager [Certificates](https://cert-manager.io/docs/usage/certificate/), you must make sure that the `subject`, `commonName`, `dnsNames`, etc. are allowed and/or configured correctly by your Certificate Template in Command.
45+
The same goes for **Enrollment RegExes** and **Policies** defined on your Certificate Template. When creating cert-manager [Certificates](https://cert-manager.io/docs/usage/certificate/), you must make sure that the `subject`, `commonName`, `dnsNames`, etc. are allowed and/or configured correctly by your Certificate Template in Command.
4646

4747
3. **Configure Command Security Roles and Claims**
4848

49-
In Command, Security Roles define groups of users or administrators with specific permissions. Users and subjects are identified by Claims. By adding a Claim to a Security Role, you can dictate what actions the user or subject can perform and what parts of the system it can interact with.
49+
In Command, Security Roles define groups of users or administrators with specific permissions. Users and subjects are identified by Claims. By adding a Claim to a Security Role, you can define what actions the user or subject can perform and what parts of the system it can interact with.
5050

5151
- If you haven't created Roles and Access rules before, [this guide](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/SecurityOverview.htm?Highlight=Security%20Roles) provides a primer on these concepts in Command.
5252

@@ -61,7 +61,7 @@ Command Issuer enrolls certificates by submitting a POST request to the CSR Enro
6161

6262
Command Issuer is installed using a Helm chart. The chart is available in the [Command cert-manager Helm repository](https://keyfactor.github.io/command-cert-manager-issuer/).
6363

64-
1. Verify that at least one Kubernetes node is running
64+
1. Verify that at least one Kubernetes node is running:
6565

6666
```shell
6767
kubectl get nodes
@@ -95,9 +95,9 @@ These credentials must be configured using a Kubernetes Secret. By default, the
9595

9696
> Command Issuer can read secrets in the Issuer namespace if `--set "secretConfig.useClusterRoleForSecretAccess=true"` flag is set when installing the Helm chart.
9797

98-
Command Issuer also supports ambient authentication, where a token is fetched from an Authorization Server using a cloud provider's auth infrastructure and passed to Command directly.
98+
Command Issuer also supports ambient authentication, where a token is fetched from an Authorization Server using a cloud provider's auth infrastructure and passed to Command directly. The following methods are supported:
9999
100-
- Azure Workload Identity (if running in [AKS](https://azure.microsoft.com/en-us/products/kubernetes-service))
100+
- Managed Identity Using Azure Entra ID Workload Identity (if running in [AKS](https://azure.microsoft.com/en-us/products/kubernetes-service))
101101
102102
## Basic Auth
103103

0 commit comments

Comments
 (0)