Skip to content

Commit a42343b

Browse files
committed
more vale fun
1 parent 1bc248f commit a42343b

File tree

4 files changed

+13
-8
lines changed

4 files changed

+13
-8
lines changed

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ Grafana
6565
Gravatar
6666
HTTP
6767
HyperKit
68+
IAM
6869
IPs?
6970
IPv[46]
7071
IPvlan
@@ -73,6 +74,7 @@ Intune
7374
Jamf
7475
JFrog
7576
JetBrains
77+
Kerberos
7678
Kitematic
7779
Kubernetes
7880
LTS
@@ -92,9 +94,9 @@ NTLM
9294
Nuxeo
9395
OAuth
9496
OCI
95-
[Oo]nboarding
9697
OTel
9798
Okta
99+
PAT
98100
Postgres
99101
PowerShell
100102
Python
@@ -143,8 +145,10 @@ Zsh
143145
[Ff]iletypes?
144146
[GgCc]oroutine
145147
[Hh]ostname
148+
[Ii]nfosec
146149
[Ll]oopback
147150
[Mm]oby
151+
[Oo]nboarding
148152
[Pp]aravirtualization
149153
[Pp]roxying
150154
[Rr]eal-time
@@ -154,10 +158,12 @@ Zsh
154158
[Ss]warm
155159
[Tt]oolchains?
156160
[Vv]irtualize
161+
[Vv]irtiofs
157162
[Ww]alkthrough
158163
cgroup
159164
config
160165
containerd
166+
deprovisioning
161167
deserialization
162168
deserialize
163169
displayName
@@ -192,5 +198,4 @@ ufw
192198
umask
193199
ungated
194200
vSphere
195-
virtiofs
196201
vpnkit

content/guides/admin-set-up/comms-and-info-gathering.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The Docker organization owner and the development lead should review the setting
3737
| `proxy` | | This setting configures the proxy used by Docker Desktop to access the internet. The proxy can be set manually or get its value from the system.|
3838
| `wslEngineEnabled` | Windows only | This setting specifies whether the user should use WSL 2 or HyperV for the VM for Windows installations.|
3939
| `kubernetes` | | Docker Desktop offers a Kubernetes single-node cluster for Kubernetes deployments locally. This setting controls whether it is started when Docker Desktop starts, and its configuration.|
40-
| `analyticsEnabled` | | Docker lets users to opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
40+
| `analyticsEnabled` | | Docker lets users opt out of sending usage data to Docker. The usage data feeds what admins are able to see about Docker Desktop usage, so it is highly recommended to enable and lock this setting.|
4141
| `useVirtualizationFrameworkVirtioFS`| macOS only | Virtiofs is the newer higher performance file sharing framework for Mac. It takes precedence over the older frameworks if it is enabled.|
4242
| `useVirtualizationFrameworkRosetta` | macOS only | Rosetta is the Apple emulator for x86 chipsets. This setting lets Docker Desktop to use Rosetta when running containers built for the x86 chipset.|
4343
| `allowExperimentalFeatures` | | Docker Desktop versions often contain experimental features for trial and feedback. If this setting is set to false, experimental features are disabled.|
@@ -68,12 +68,12 @@ Docker also offers a number of security related features, again through [Setting
6868
| `windowsDockerdPort` | Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. It is available for Windows containers only. |
6969
| `filesharingAllowedDirectories` | | Specify which paths on the developer host machine or network your users can add container file shares to.|
7070
| `enableKerberosNtlm` | | When set to true, Kerberos and NTLM authentication is enabled. Default is false. Available in Docker Desktop version 4.32 and later.|
71-
| `containersProxy` | | Allows you to create air-gapped containers. For more information, see [Air-Gapped Containers](/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md).|
71+
| `containersProxy` | | Lets you create air-gapped containers. For more information, see [Air-Gapped Containers](/manuals/security/for-admins/hardened-desktop/air-gapped-containers.md).|
7272
| `blockDockerLoad` | | When this setting is enabled, users can no longer run the `docker load` command and will receive an error if they try.|
7373
| `disableUpdate` | | Users get notifications about new Docker Desktop versions. Enabling this setting removes those notifications. Helpful if corporate IT manages Docker Desktop version updates for users.|
7474

7575
{{< /accordion >}}
7676

7777
## Optional step four: Meet with the Docker Implementation team
7878

79-
The Docker Implementation team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected].
79+
The Docker Implementation team can help you step through setting up your organization, configuring SSO, enforcing sign in, and configuring Docker. You can reach out to set up a meeting by emailing [email protected].

content/guides/admin-set-up/deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ weight: 40
99
1010
## Step one: Enforce SSO
1111

12-
Enforcing SSO means that anyone who has a Docker profile with an email address that matches your verified domain must sign in using your SSO connection. Make sure the Identity provider groups associated with your SSO connection cover all the developer groups that you want to have access to the Docker subscription.
12+
Enforcing SSO means that anyone who has a Docker profile with an email address that matches your verified domain must sign in using your SSO connection. Make sure the Identity provider groups associated with your SSO connection cover all the developer groups that you want to have access to the Docker subscription.
1313

1414
## Step two: Deploy configuration settings and enforce sign-in to users
1515

content/guides/admin-set-up/finalize-plans-and-setup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ If you have more than one organization, it’s recommended that you either conso
2222

2323
### Set up single sign-on SSO domain verification
2424

25-
Single sign-on (SSO) allows developers to authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
25+
Single sign-on (SSO) lets developers to authenticate using their identity providers (IdPs) to access Docker. SSO is available for a whole company, and all associated organizations, or an individual organization that has a Docker Business subscription. For more information, see the [documentation](/manuals/security/for-admins/single-sign-on/_index.md).
2626

2727
You can also enable [SCIM] for further automation of provisioning and deprovisioning of users.
2828

@@ -40,4 +40,4 @@ You can also enable [SCIM] for further automation of provisioning and deprovisio
4040
4141
Existing users may be running outdated or unsupported versions of Docker Desktop. It is highly recommended all users update to a supported version. Docker Desktop versions released within the past 6 months from the latest release are supported.
4242

43-
We recommend using a MDM solution to manage the version of Docker Desktop for users. Users may also get Docker Desktop directly from Docker or through a company software portal.
43+
It's recommended that you use us a MDM solution to manage the version of Docker Desktop for users. Users may also get Docker Desktop directly from Docker or through a company software portal.

0 commit comments

Comments
 (0)