@@ -72,18 +72,18 @@ Rather than using a Secret to protect confidential data, you can pick from alter
72
72
73
73
Here are some of your options:
74
74
75
- - if your cloud-native component needs to authenticate to another application that you
75
+ - If your cloud-native component needs to authenticate to another application that you
76
76
know is running within the same Kubernetes cluster, you can use a
77
77
[ ServiceAccount] ( /docs/reference/access-authn-authz/authentication/#service-account-tokens )
78
78
and its tokens to identify your client.
79
- - there are third-party tools that you can run, either within or outside your cluster,
79
+ - There are third-party tools that you can run, either within or outside your cluster,
80
80
that provide secrets management. For example, a service that Pods access over HTTPS,
81
81
that reveals a secret if the client correctly authenticates (for example, with a ServiceAccount
82
82
token).
83
- - for authentication, you can implement a custom signer for X.509 certificates, and use
83
+ - For authentication, you can implement a custom signer for X.509 certificates, and use
84
84
[ CertificateSigningRequests] ( /docs/reference/access-authn-authz/certificate-signing-requests/ )
85
85
to let that custom signer issue certificates to Pods that need them.
86
- - you can use a [ device plugin] ( /docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/ )
86
+ - You can use a [ device plugin] ( /docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/ )
87
87
to expose node-local encryption hardware to a specific Pod. For example, you can schedule
88
88
trusted Pods onto nodes that provide a Trusted Platform Module, configured out-of-band.
89
89
0 commit comments