Skip to content

Commit 7caa9e0

Browse files
authored
Merge pull request #27398 from bergerhoffer/term-updates-auth
Terminology style updates for auth book
2 parents 3b31dce + c94fa39 commit 7caa9e0

File tree

59 files changed

+178
-178
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+178
-178
lines changed

_topic_map.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -603,7 +603,7 @@ Topics:
603603
File: tokens-scoping
604604
- Name: Using bound service account tokens
605605
File: bound-service-account-tokens
606-
- Name: Managing Security Context Constraints
606+
- Name: Managing security context constraints
607607
File: managing-security-context-constraints
608608
Distros: openshift-enterprise,openshift-webscale,openshift-origin
609609
- Name: Impersonating the system:admin user

authentication/identity_providers/configuring-basic-authentication-identity-provider.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
[id="configuring-basic-authentication-identity-provider"]
2-
= Configuring an basic authentication identity provider
2+
= Configuring a basic authentication identity provider
33
include::modules/common-attributes.adoc[]
44
:context: configuring-basic-authentication-identity-provider
55
toc::[]
66

77
Configure a `basic-authentication` identity provider for users to log in to
88
{product-title} with credentials validated against a remote identity provider.
9-
Basic authentication is a generic backend integration mechanism.
9+
Basic authentication is a generic back-end integration mechanism.
1010

1111
include::modules/identity-provider-overview.adoc[leveloffset=+1]
1212

authentication/managing-security-context-constraints.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[id="managing-pod-security-policies"]
2-
= Managing Security Context Constraints
2+
= Managing security context constraints
33
include::modules/common-attributes.adoc[]
44
:context: configuring-internal-oauth
55
toc::[]

modules/bound-sa-tokens-configuring.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ You can configure pods to request bound service account tokens by using volume p
1818
+
1919
This step is typically not required if the bound tokens are used only within the cluster.
2020

21-
.. Edit the `cluster` authentication object:
21+
.. Edit the `cluster` `Authentication` object:
2222
+
2323
[source,terminal]
2424
----

modules/identity-provider-about-basic-authentication.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[id="identity-provider-about-basic-authentication_{context}"]
66
= About basic authentication
77

8-
Basic authentication is a generic backend integration mechanism that allows
8+
Basic authentication is a generic back-end integration mechanism that allows
99
users to log in to {product-title} with credentials validated against a remote
1010
identity provider.
1111

modules/identity-provider-about-request-header.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ https://access.redhat.com/support/offerings/techpreview/.
7070

7171
endif::[]
7272

73-
`oc` supports the Security Support Provider Interface (SSPI) to allow for SSO
73+
The OpenShift CLI (`oc`) supports the Security Support Provider Interface (SSPI) to allow for SSO
7474
flows on Microsft Windows. If you use the request header identity provider with a
7575
GSSAPI-enabled proxy to connect an Active Directory server to {product-title},
7676
users can automatically authenticate to {product-title} by using the `oc` command

modules/identity-provider-add.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ users can authenticate.
3434
.Prerequisites
3535

3636
* Create an {product-title} cluster.
37-
* Create the Custom Resource (CR) for your identity providers.
37+
* Create the custom resource (CR) for your identity providers.
3838
* You must be logged in as an administrator.
3939

4040
.Procedure

modules/identity-provider-apache-custom-proxy-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,6 @@ proxy to `\https://<namespace_route>/oauth/authorize/approve?...`.
2929

3030
[NOTE]
3131
====
32-
The `\https://<namespace_route>` address is the Route to the OAuth server and
32+
The `\https://<namespace_route>` address is the route to the OAuth server and
3333
can be obtained by running `oc get route -n openshift-authentication`.
3434
====

modules/identity-provider-basic-authentication-CR.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[id="identity-provider-basic-authentication-CR_{context}"]
66
= Sample basic authentication CR
77

8-
The following Custom Resource (CR) shows the parameters and acceptable values for an
8+
The following custom resource (CR) shows the parameters and acceptable values for a
99
basic authentication identity provider.
1010

1111
.Basic authentication CR
@@ -32,12 +32,12 @@ spec:
3232
----
3333
<1> This provider name is prefixed to the returned user ID to form an identity
3434
name.
35-
<2> Controls how mappings are established between this provider's identities and user objects.
35+
<2> Controls how mappings are established between this provider's identities and `User` objects.
3636
<3> URL accepting credentials in Basic authentication headers.
37-
<4> Optional: Reference to an {product-title} ConfigMap containing the
37+
<4> Optional: Reference to an {product-title} `ConfigMap` object containing the
3838
PEM-encoded certificate authority bundle to use in validating server
3939
certificates for the configured URL.
40-
<5> Optional: Reference to an {product-title} Secret containing the client
40+
<5> Optional: Reference to an {product-title} `Secret` object containing the client
4141
certificate to present when making requests to the configured URL.
42-
<6> Reference to an {product-title} Secret containing the key for the
42+
<6> Reference to an {product-title} `Secret` object containing the key for the
4343
client certificate. Required if `tlsClientCert` is specified.

modules/identity-provider-config-map.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@
88
// * authentication/identity_providers/configuring-request-header-identity-provider.adoc
99

1010
[id="identity-provider-creating-configmap_{context}"]
11-
= Creating a ConfigMap
11+
= Creating a config map
1212

13-
Identity providers use {product-title} ConfigMaps in the `openshift-config`
13+
Identity providers use {product-title} `ConfigMap` objects in the `openshift-config`
1414
namespace to contain the certificate authority bundle. These are primarily
1515
used to contain certificate bundles needed by the identity provider.
1616

17-
* Define an {product-title} ConfigMap containing the
17+
* Define an {product-title} `ConfigMap` object containing the
1818
certificate authority by using the following command. The certificate
19-
authority must be stored in the `ca.crt` key of the ConfigMap.
19+
authority must be stored in the `ca.crt` key of the `ConfigMap` object.
2020
+
2121
[source,terminal]
2222
----

0 commit comments

Comments
 (0)