Skip to content

Commit d384f11

Browse files
author
Tomoya Usami
committed
Fix permitted key usages
1 parent a1fdec2 commit d384f11

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/en/docs/reference/access-authn-authz/certificate-signing-requests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Kubernetes provides built-in signers that each have a well-known `signerName`:
180180
1. Permitted subjects - organizations are exactly `["system:nodes"]`, common name starts with "`system:node:`".
181181
1. Permitted x509 extensions - honors key usage and DNSName/IPAddress subjectAltName extensions, forbids EmailAddress and
182182
URI subjectAltName extensions, drops other extensions. At least one DNS or IP subjectAltName must be present.
183-
1. Permitted key usages - `["key encipherment", "digital signature", "client auth"]` or `["digital signature", "client auth"]`.
183+
1. Permitted key usages - `["key encipherment", "digital signature", "server auth"]` or `["digital signature", "server auth"]`.
184184
1. Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
185185
of the `--cluster-signing-duration` option or, if specified, the `spec.expirationSeconds` field of the CSR object.
186186
1. CA bit allowed/disallowed - not allowed.

0 commit comments

Comments
 (0)