Skip to content

Commit d35d1f7

Browse files
authored
Deleting typo
1 parent 46add51 commit d35d1f7

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/service-fabric/cluster-security-certificate-management.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,6 @@ Continuing with Azure as the context, and using Key Vault as the secret-manageme
116116
- Under `{vaultUri}/secrets/{name}`: The certificate, including its private key, available for downloading as an unprotected PFX or PEM file.
117117

118118
Recall that a certificate in the key vault contains a chronological list of certificate instances that share a policy. Certificate versions will be created according to the lifetime and renewal attributes of this policy. We highly recommend that vault certificates not share subjects or domains or DNS names, because it can be disruptive in a cluster to provision certificate instances from different vault certificates, with identical subjects but substantially different other attributes, such as issuer, key usages, and so on.
119-
s
120119
At this point, a certificate exists in the key vault, ready for consumption. Now let's explore the rest of the process.
121120

122121
### Certificate provisioning

0 commit comments

Comments
 (0)