Skip to content

Commit 024562c

Browse files
committed
Update links
1 parent 9b2921e commit 024562c

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,28 +15,28 @@ include::modules/security-rbac-overview.adoc[leveloffset=+1]
1515
[role="_additional-resources"]
1616
.Additional resources
1717

18-
* link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
18+
* xref:../../../authentication/using-rbac.adoc#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
1919
2020
include::modules/security-sec-accounts-overview.adoc[leveloffset=+1]
2121

2222
[role="_additional-resources"]
2323
.Additional resources
2424

25-
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-and-creating-service-accounts.html[Understanding and creating service accounts]
25+
* xref:../../../authentication/understanding-and-creating-service-accounts.adoc#understanding-and-creating-service-accounts[Understanding and creating service accounts]
2626
2727
include::modules/security-identity-prov-config.adoc[leveloffset=+1]
2828

2929
[role="_additional-resources"]
3030
.Additional resources
3131

32-
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-identity-provider.html[Understanding identity provider configuration]
32+
* xref:../../../authentication/understanding-identity-provider.adoc#understanding-identity-provider[Understanding identity provider configuration]
3333
3434
include::modules/security-replacing-kubeadmin-user.adoc[leveloffset=+1]
3535

3636
[role="_additional-resources"]
3737
.Additional resources
3838

39-
* link:https://docs.openshift.com/container-platform/4.17/authentication/identity_providers/configuring-htpasswd-identity-provider.html#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[About htpasswd authentication]
39+
* xref:../../../authentication/identity_providers/configuring-htpasswd-identity-provider.adoc#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[Configuring an htpasswd identity provider]
4040
4141
include::modules/security-sec-considerations-telco.adoc[leveloffset=+1]
4242

@@ -49,4 +49,4 @@ include::modules/security-lifecycle-mgmnt.adoc[leveloffset=+1]
4949
[role="_additional-resources"]
5050
.Additional resources
5151

52-
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/updating/update-welcome.html[Upgrading a telco core CNF clusters]
52+
* xref:../../../edge_computing/day_2_core_cnf_clusters/updating/telco-update-welcome.adoc#telco-update-welcome[Upgrading a telco core CNF clusters]

modules/security-sec-context-constraints.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ Security context constraints allow an administrator to control the following sec
2626
2727
Default SCCs are created during installation and when you install some Operators or other components. As a cluster administrator, you can also create your own SCCs by using the OpenShift CLI (`oc`).
2828

29-
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
29+
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
3030

3131
[IMPORTANT]
3232
====
3333
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. Additionally, the default SCC values are reset to the defaults during some cluster upgrades, which discards all customizations to those SCCs.
3434
35-
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
35+
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
3636
====
3737

3838
You can use the following basic SCCs:
@@ -96,4 +96,4 @@ The `restricted-v2` SCC explicitly denies everything except what it explicitly a
9696
* Allowed capabilities: `NET_BIND_SERVICE`. A pod can request this capability, but it is not added by default.
9797
* Allowed `seccomp` profiles: `runtime/default`.
9898
99-
For more information, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html[Managing security context constraints].
99+
For more information, see link:https://docs.openshift.com/container-platform/{product-version}/authentication/managing-security-context-constraints.html[Managing security context constraints].

0 commit comments

Comments
 (0)