Skip to content

Commit 04d7e8f

Browse files
committed
OCPBUGS-46020: Fixed link in Location section of Proxy cert doc
1 parent 72da6af commit 04d7e8f

File tree

2 files changed

+6
-13
lines changed

2 files changed

+6
-13
lines changed

modules/security-hardening-what.adoc

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,13 @@
66

77
= Choosing what to harden in {op-system}
88
ifdef::openshift-origin[]
9-
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any
10-
{op-system-base} system.
9+
The link:https://docs.fedoraproject.org/en-US/Fedora/19/html/Security_Guide/chap-Security_Guide-Basic_Hardening.html[{op-system-base} Security Hardening] guide describes how you should approach security for any {op-system-base} system.
1110
endif::[]
1211
ifdef::openshift-enterprise,openshift-webscale,openshift-aro[]
13-
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 8 Security Hardening] guide describes how you should approach security for any
14-
{op-system-base} system.
12+
The link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/security_hardening/index#scanning-container-and-container-images-for-vulnerabilities_scanning-the-system-for-security-compliance-and-vulnerabilities[{op-system-base} 9 Security Hardening] guide describes how you should approach security for any {op-system-base} system.
1513
endif::[]
1614

17-
Use this guide to learn how to approach cryptography, evaluate
18-
vulnerabilities, and assess threats to various services.
19-
Likewise, you can learn how to scan for compliance standards, check file
20-
integrity, perform auditing, and encrypt storage devices.
15+
Use this guide to learn how to approach cryptography, evaluate vulnerabilities, and assess threats to various services.
16+
Likewise, you can learn how to scan for compliance standards, check file integrity, perform auditing, and encrypt storage devices.
2117

22-
With the knowledge of what features you want to harden, you can then
23-
decide how to harden them in {op-system}.
18+
With the knowledge of what features you want to harden, you can then decide how to harden them in {op-system}.

security/certificate_types_descriptions/proxy-certificates.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,9 +64,7 @@ The user-provided trust bundle is represented as a config map. The config map is
6464

6565
Complete proxy support means connecting to the specified proxy and trusting any signatures it has generated. Therefore, it is necessary to let the user specify a trusted root, such that any certificate chain connected to that trusted root is also trusted.
6666

67-
If using the RHCOS trust bundle, place CA certificates in `/etc/pki/ca-trust/source/anchors`.
68-
69-
See link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/using-shared-system-certificates_security-hardening[Using shared system certificates] in the Red Hat Enterprise Linux documentation for more information.
67+
If you use the {op-system} trust bundle, place CA certificates in `/etc/pki/ca-trust/source/anchors`. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks[Using shared system certificates] in the {op-system-base-full} _Securing networks_ document.
7068

7169
== Expiration
7270

0 commit comments

Comments
 (0)