Skip to content

Commit 5356d82

Browse files
committed
Removing unnecessary spaces
Venafi to CyberArk Signed-off-by: Atanas Chuchev <[email protected]>
1 parent e032c33 commit 5356d82

File tree

2 files changed

+11
-13
lines changed

2 files changed

+11
-13
lines changed

content/docs/configuration/venafi.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ description: 'cert-manager configuration: CyberArk Issuers'
55

66
## Introduction
77

8-
The CyberArk `Issuer` (formerly known as Venafi) allows you to obtain
9-
certificates from
10-
[CyberArk Certificate Manager](https://www.cyberark.com/products/certificate-manager/)
8+
The CyberArk `Issuer` (formerly known as Venafi) allows you to obtain
9+
certificates from
10+
[CyberArk Certificate Manager](https://www.cyberark.com/products/certificate-manager/)
1111
SaaS or self-hosted.
1212

1313
You can have multiple different CyberArk `Issuer` types installed within the same
14-
cluster, including mixtures of issuers configured to enroll from the CyberArk
15-
Certificate Manager SaaS and self-hosted. This allows you to be flexible in the
14+
cluster, including mixtures of issuers configured to enroll from the CyberArk
15+
Certificate Manager SaaS and self-hosted. This allows you to be flexible in the
1616
deployment method that you prefer to use.
1717

1818
Automated certificate renewal and management are provided for `Certificates`
@@ -33,7 +33,7 @@ resources, read the [Namespaces](../concepts/issuer.md#namespaces) section.
3333

3434
If you haven't already done so, create your CyberArk Certificate Manager SaaS
3535
account on this [page](https://www.cyberark.com/try-buy/certificate-manager-saas-trial/)
36-
and copy the API key from your user preferences. Then, you may want to create a
36+
and copy the API key from your user preferences. Then, you may want to create a
3737
custom CA Account and Issuing Template, or choose to use the defaults created
3838
automatically for testing ("Built-in CA" and "Default", respectively). Lastly,
3939
create an Application to establish ownership of all certificates requested by
@@ -114,8 +114,8 @@ Certificate Manager.
114114
The setup is similar to the CyberArk Certificate Manager SaaS configuration
115115
above, however some of the connection parameters are slightly different.
116116

117-
> **Note**: You *must* allow "User Provided CSRs" as part of your policy in
118-
> CyberArk Certificate Manager Self-Hosted, as this is the only type supported
117+
> **Note**: You *must* allow "User Provided CSRs" as part of your policy in
118+
> CyberArk Certificate Manager Self-Hosted, as this is the only type supported
119119
> by cert-manager at this time.
120120
>
121121
> More specifically, the valid configurations of the "CSR handling" are:
@@ -189,7 +189,7 @@ credentials.
189189
190190
### Username / Password Authentication
191191
192-
> **Note**: when using username / password authentication, cert-manager will manage the generation of access token for you. cert-manager does not use refresh tokens to renew access token.
192+
> **Note**: when using username / password authentication, cert-manager will manage the generation of access token for you. cert-manager does not use refresh tokens to renew access token.
193193
194194
1. Create a new user with sufficient privileges to manage certificates in a particular policy folder (zone).
195195
@@ -201,7 +201,7 @@ credentials.
201201
Set the "Base Access Settings" to `certificate: manage`.
202202
203203
"Edit Access" to the new application integration, and allow it to be used by the user you created earlier.
204-
204+
205205
3. Save the credentials to a Secret in the Kubernetes cluster
206206
207207
```bash

content/docs/tutorials/venafi/venafi.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -248,9 +248,7 @@ retrieve your Certificates from.
248248

249249
### CyberArk Certificate Manager Self-Hosted
250250

251-
Assuming you already have a self-hosted instance of CyberArk Certificate Manager
252-
set up properly, you can create a CyberArk issuer that can be used to issue
253-
certificates.
251+
Assuming you already have a self-hosted instance of CyberArk Certificate Manager set up properly, you can create a CyberArk issuer that can be used to issue certificates.
254252

255253
To do this, you need to make sure you have your *username* and *password* for
256254
your CyberArk Certificate Manager Self-Hosted instance.

0 commit comments

Comments
 (0)