Skip to content

Commit 145b7b8

Browse files
fixes
1 parent 6f3deec commit 145b7b8

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

ibm_catalog.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"products": [
33
{
44
"name": "deploy-arch-secrets-manager-public-cert-engine",
5-
"label": "Cloud automation for Secrets Manager Public Certificates Engine",
5+
"label": "Cloud automation for Secrets Manager public certificates engine",
66
"product_kind": "solution",
77
"tags": [
88
"ibm_created",
@@ -20,8 +20,8 @@
2020
"terraform",
2121
"solution"
2222
],
23-
"short_description": "Creates and configures a Secrets Manager Public Certificates Engine",
24-
"long_description": "This deployable architecture sets up a Public Certificates Engine in IBM Cloud Secrets Manager, enabling automated provisioning and management of publicly trusted Transport Layer Security (TLS) certificates. These certificates are issued by Let’s Encrypt, a widely trusted Certificate Authority (CA) that helps secure websites and applications with HTTPS. This deployable architecture configures integration between IBM Cloud Secrets Manager, Cloud Internet Services (CIS) for Domain Name System (DNS) validation, and Let’s Encrypt as the Certificate Authority (CA). It provisions the required authorization policies, DNS configuration, and CA configuration so that applications can obtain and renew public certificates automatically.\n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
23+
"short_description": "Creates and configures a Secrets Manager public certificates engine",
24+
"long_description": "This deployable architecture sets up a public certificates engine in IBM Cloud Secrets Manager, enabling automated provisioning and management of publicly trusted Transport Layer Security (TLS) certificates. These certificates are issued by Let’s Encrypt, a widely trusted Certificate Authority (CA) that helps secure websites and applications with HTTPS. This deployable architecture configures integration between IBM Cloud Secrets Manager, Cloud Internet Services (CIS) for Domain Name System (DNS) validation, and Let’s Encrypt as the Certificate Authority (CA). It provisions the required authorization policies, DNS configuration, and CA configuration so that applications can obtain and renew public certificates automatically.\n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
2525
"offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/blob/main/README.md",
2626
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/main/images/secrets_manager_public_cert_engine.svg",
2727
"provider_name": "IBM",
@@ -61,7 +61,7 @@
6161
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/main/reference-architecture/deployable-architecture-sm-public-cert-engine.svg",
6262
"type": "image/svg+xml"
6363
},
64-
"description": "This architecture supports creating a Secrets Manager Public Certificates Engine within a Secrets Manager instance. The Secrets Manager Public Certificates Engine enables you to issue and manage publicly trusted TLS/SSL certificates by integrating with external Certificate Authorities such as Let's Encrypt. It supports configuring DNS providers like IBM Cloud Internet Services (CIS) for domain validation, managing CA configurations, and automating the issuance and renewal of public certificates for internet-facing applications and services."
64+
"description": "This architecture supports creating a Secrets Manager public certificates engine within a Secrets Manager instance. The Secrets Manager public certificates engine enables you to issue and manage publicly trusted TLS/SSL certificates by integrating with external Certificate Authorities such as Let's Encrypt. It supports configuring DNS providers like IBM Cloud Internet Services (CIS) for domain validation, managing CA configurations, and automating the issuance and renewal of public certificates for internet-facing applications and services."
6565
}
6666
]
6767
},
@@ -100,7 +100,7 @@
100100
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
101101
],
102102
"service_name": "secrets-manager",
103-
"notes": "Required for creating a Secrets Manager instance to deploy Public Certificates Engine."
103+
"notes": "Required for creating a Secrets Manager instance to deploy public certificates engine."
104104
},
105105
{
106106
"role_crns": [
@@ -132,7 +132,7 @@
132132
"crn:v1:bluemix:public:iam::::role:Editor"
133133
],
134134
"service_name": "cloud-object-storage",
135-
"notes": "[Optional] Required if you are consuming the Observability deployable architecture and provision Object Storage."
135+
"notes": "[Optional] Required if you are provisioning Object Storage."
136136
},
137137
{
138138
"role_crns": [
@@ -148,15 +148,15 @@
148148
"crn:v1:bluemix:public:iam::::role:Editor"
149149
],
150150
"service_name": "hs-crypto",
151-
"notes": "[Optional] Required if Hyper Protect Crypto Service is used for encryption in Cloud automation for Observability."
151+
"notes": "[Optional] Required if Hyper Protect Crypto Service is used for encryption."
152152
},
153153
{
154154
"role_crns": [
155155
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
156156
"crn:v1:bluemix:public:iam::::role:Editor"
157157
],
158158
"service_name": "kms",
159-
"notes": "[Optional] Required to deploy Cloud automation for Key Protect in Cloud automation for Observability."
159+
"notes": "[Optional] Required to deploy Cloud automation for Key Protect."
160160
}
161161
],
162162
"configuration": [

0 commit comments

Comments
 (0)