@@ -137,11 +137,11 @@ Here are some of your options:
137
137
下面是一些选项:
138
138
139
139
<!--
140
- - if your cloud-native component needs to authenticate to another application that you
140
+ - If your cloud-native component needs to authenticate to another application that you
141
141
know is running within the same Kubernetes cluster, you can use a
142
142
[ServiceAccount](/docs/reference/access-authn-authz/authentication/#service-account-tokens)
143
143
and its tokens to identify your client.
144
- - there are third-party tools that you can run, either within or outside your cluster,
144
+ - There are third-party tools that you can run, either within or outside your cluster,
145
145
that provide secrets management. For example, a service that Pods access over HTTPS,
146
146
that reveals a secret if the client correctly authenticates (for example, with a ServiceAccount
147
147
token).
@@ -153,10 +153,10 @@ Here are some of your options:
153
153
例如,这一工具可能是 Pod 通过 HTTPS 访问的一个服务,该服务在客户端能够正确地通过身份认证
154
154
(例如,通过 ServiceAccount 令牌)时,提供机密数据内容。
155
155
<!--
156
- - for authentication, you can implement a custom signer for X.509 certificates, and use
156
+ - For authentication, you can implement a custom signer for X.509 certificates, and use
157
157
[CertificateSigningRequests](/docs/reference/access-authn-authz/certificate-signing-requests/)
158
158
to let that custom signer issue certificates to Pods that need them.
159
- - you can use a [device plugin](/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/)
159
+ - You can use a [device plugin](/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/)
160
160
to expose node-local encryption hardware to a specific Pod. For example, you can schedule
161
161
trusted Pods onto nodes that provide a Trusted Platform Module, configured out-of-band.
162
162
-->
0 commit comments