You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: agent.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,8 @@
1
-
Use vale for docs linting, ignoring auto-generated files in step-cli/reference
1
+
Use vale for docs linting.
2
+
When running vale, always ignore auto-generated files in step-cli/reference:
3
+
4
+
vale --no-wrap --glob='!step-cli/reference/**'
5
+
2
6
DO NOT modify any auto-generated files inside step-cli/reference
3
7
Use markdown-link-check to check links
4
8
To preview the docs in a web browser, run `pnpm dev` inside the `smallstep.com` repo, which you may find in the parent directory. A server will open on https://localhost:5050
Copy file name to clipboardExpand all lines: certificate-manager/acme-old.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Automatically manage certificates on internal websites, servers, and the entire
22
22
### About ACME
23
23
At a high level, ACME is pretty simple. An ACME client creates an account with an ACME server and submits a certificate order. The server responds with a set of challenges for the client to complete to prove control over identifiers (domain names) in the certificate. Once the client successfully completes these challenges, it submits a certificate signing request (CSR) and the server issues a certificate.
24
24
25
-
The most interesting part of all of this is the challenge – where the client proves control over an identifier. No single standard way exists to "prove control" over an "identifier", so the core ACME specification makes this an extension point. Smallstep supports all the popular ACME challenges including DNS, HTTP, ALPN, IP, and EAB configurations.
25
+
The most interesting part of all of this is the challenge—where the client proves control over an identifier. No single standard way exists to "prove control" over an "identifier", so the core ACME specification makes this an extension point. Smallstep supports all the popular ACME challenges including DNS, HTTP, ALPN, IP, and EAB configurations.
26
26
27
27
### ACME challenge verification
28
28
When public ACME Certificate Authorities (CA) like Let's Encrypt issue certificates to clients in the Web PKI, the CA depends heavily on public DNS for client verification. To get a certificate, a client must prove to the CA that it either directly controls the public DNS records for a domain (for the DNS-01 challenge type) or controls the IP address pointed to by public DNS records (for the HTTP-01 and TLS-ALPN-01 challenge types).
Copy file name to clipboardExpand all lines: certificate-manager/basic-ops.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This tutorial covers:
23
23
### Before you begin
24
24
This tutorial assumes you have created a Smallstep Team and a Certificate Manager Authority using the steps in [Getting Started](./getting-started.mdx).
25
25
26
-
### Step 1 - Create a test certificate
26
+
### 1.Create a test certificate
27
27
28
28
With an Authority created and your local client configured,
29
29
you can create a test certificate by running the `step ca certificate` command.
@@ -43,7 +43,7 @@ In this command, we are asking the CA to create a certificate with the following
43
43
When you run this command, it will envoke the `authority-admin` provisioner and start a single sign-on flow via the Smallstep console.
44
44
After a successful sign-in, the authority will issue the certificate.
0 commit comments