-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
reorder table and topics to group required config for API ML #4276
reorder table and topics to group required config for API ML #4276
Conversation
Signed-off-by: Andrew Jandacek <[email protected]>
😺 Thank you for creating this PR! To publish your content to Zowe Docs, follow these required steps.
Need help? Contact the Doc Squad in the #zowe-doc Slack channel. |
📁 The PR description is missing the file name(s) for the updated content. List all the files included in this PR so this information displays in our Zowe Docs GitHub Slack channel. If you have addressed this issue already, refresh this page in your browser to remove this comment. |
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
|
||
There are two methods to enable client certificate functionality: | ||
There are two methods to enable x509 client certificate functionality: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Even though the certificates we use are x509 we also have x509 as the authentication scheme.
For the authentication scheme you need neither setups. For the client certificate authentication in general you need either one of them.
So maybe something like:
There are two methods to enable client certificate functionality integrated with the SAF:
@@ -3,9 +3,9 @@ | |||
:::info Roles: system programmer, system administrator, security administrator |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally be careful with addition of the x509, while it is true that the certificates we support are x509 we also use the term in another way which may confuse people.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The reason behind this addition is that there is a terminology discrepancy between references in Zowe Docs to just client certificates and references in ESZ that describe x.509 client certificates. It should be clear that the certificates are x509 in the Zowe doc if that is where we are sending ESZ customers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, Then we should use X.509 as the exact name in the Zowe Docs as well.
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: Andrew Jandacek <[email protected]>
Describe your pull request here: reorder table and topics to group required config for API ML
List the file(s) included in this PR: configure-zos-system (v2.18), configuration-client-certificates, authenticating-with-client-certificates
After creating the PR, follow the instructions in the comments.