Skip to content

Commit b1b1fe3

Browse files
committed
More vale fixes
1 parent 22afca0 commit b1b1fe3

19 files changed

+66
-49
lines changed

.vale/styles/Smallstep/Branding.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,3 +16,8 @@ swap:
1616
Yubikeys: YubiKeys
1717
yubikeys: YubiKeys
1818
YUBIKEYS: YubiKeys
19+
on-premise: on-premises
20+
On-premise: On-premises
21+
on premise: on-premises
22+
On Premise: On-premises
23+
wire: Wire

.vale/styles/config/vocabularies/Smallstep/accept.txt

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ DTLS
4747
DevOps
4848
Diffie-Hellman
4949
Dockerfile
50+
Docker Compose
5051
EAB
5152
EAP
5253
ECDH
@@ -60,7 +61,10 @@ Encrypt
6061
Enrollment
6162
Entra ID
6263
FIPS
64+
F5 Access
65+
F5 Edge
6366
FQDN
67+
FreeBSD
6468
GCP
6569
Gartner
6670
GitHub
@@ -92,7 +96,9 @@ JWSs
9296
JWT
9397
JWTs
9498
Jamf
99+
Jamf Pro
95100
JavaScript
101+
Juniper Mist
96102
Kubernetes
97103
LDAP
98104
LTV
@@ -104,12 +110,14 @@ Merkle
104110
MicroTik
105111
Micromdm
106112
MikroTik
113+
Microsoft Edge
107114
Modbus
108115
Modelling
109116
NDES
110117
NDR
111118
NGINX
112119
NIST
120+
NixOS
113121
NSS
114122
NTP
115123
NTPS
@@ -313,6 +321,7 @@ Webhook
313321
Webhooks
314322
Wi
315323
Winget
324+
Wire
316325
Wireguard
317326
WjX
318327
Wolfi
@@ -676,6 +685,7 @@ ie
676685
ACLs
677686
Admin
678687
APIs
688+
Aruba
679689
apk
680690
Asus
681691
boolean
@@ -712,6 +722,7 @@ plist
712722
RAs
713723
rollout
714724
Sophos
725+
Sophos UTM
715726
SSIDs
716727
STMicro
717728
tss
@@ -870,6 +881,7 @@ reasonCode
870881
redirect_uri
871882
reverse_proxy
872883
root_ca_key
884+
root_ca
873885
sed
874886
select_account
875887
serverAuth

certificate-manager/acme/how-to-use-acme.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ With Smallstep Certificate Manager
99
you can deploy ACME on your internal network with ease.
1010
Before deploying,
1111
it's important to consider what deployment options works best for your organization,
12-
which include our hosted as well as our on-premise solutions.
12+
which include our hosted as well as our on-premises solutions.
1313
For each of those,
1414
it may be necessary to also deploy a Registration Authority (RA),
1515
which ensures ACME clients can be challenged on the internal network
@@ -31,7 +31,7 @@ With Smallstep Certificate Manager,
3131
you can deploy ACME on your internal network with ease.
3232
It is possible to use our hosted solution,
3333
or you can deploy the Smallstep platform to your own infrastructure
34-
using our on-premise solution.
34+
using our on-premises solution.
3535
These options are described below.
3636

3737
#### Hosted
@@ -69,7 +69,7 @@ providing control over what domains are allowed to request a certificate,
6969
or by requiring External Account Binding (EAB) to be used,
7070
so that only known ACME clients can request a certificate.
7171

72-
#### On-premise
72+
#### On-premises
7373

7474
It is also possible to deploy the Smallstep platform to your own infrastructure.
7575
If your infrastructure

certificate-manager/acme/when-to-use-acme.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The below listing is an overview of exemplary scenarios in which the ACME protoc
3434
The ACME protocol is primarily well-suited for use cases that are similar as to how the Web PKI is used.
3535
This means it can be used for issuing certificates to internal workloads, including databases, proxies and queues.
3636
With the Smallstep platform, certificates issued using ACME are not recorded in a Certificate Transparency log, keeping your internal infrastructure confidential.
37-
It is also possible to deploy ACME with an on-premise deployment of the Smallstep platform, to be in full control over the system or to be used in airgapped networks, for example.
37+
It is also possible to deploy ACME with an on-premises deployment of the Smallstep platform, to be in full control over the system or to be used in airgapped networks, for example.
3838
- An environment requiring certificates for Mutual TLS, such as a service mesh.
3939
This use case is similar as the one above, but this time also includes client side authentication using a certificate.
4040
Considering the clients in those environments are often primarily concerned with infrastructural concerns, they can be issued a client certificate using ACME if they can solve challenges.

certificate-manager/kubernetes-tls/kubernetes-autocert.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ step ca provisioner add autocert --create
4242

4343
You’ll be asked to provide a password to encrypt the provisioner private key.
4444

45-
## Create configmaps and a secret for Autocert
45+
## Create ConfigMaps and a secret for Autocert
4646

4747
In Kubernetes, create a namespace for autocert:
4848

certificate-manager/kubernetes-tls/kubernetes-install.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ We think issuing a one-year certificate and moving on is setting you up for pain
2020
In fact, we [blogged about a better way](https://smallstep.com/blog/kubernetes-the-secure-way) and created a pull request to Hightower's repo.
2121
You should certainly check it out if you are building a Kubernetes cluster from scratch.
2222

23-
### Extra credit: Ad__phrase_12__lers
23+
### Extra credit: Admission Controllers
2424

2525
An *[Admission Controller](https://kubernetes.io/blog/2019/03/21/a-guide-to-kubernetes-admission-controllers/)* is a plugin that can intercept calls to the Kubernetes API server and modify the request or reject it altogether.
2626
For example, the `autocert` project also uses a *mutating* Admission Controller to inject a secret into the Pod-spec during Pod creation.

registration-authorities/acme-for-cas.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ gcloud privateca subordinates describe example-intermediate-ca \
140140
--role=roles/privateca.certificateRequester
141141
```
142142

143-
#### 7. Launch a "smallstep ACME registration authority for CAS" deployment
143+
#### 7. Launch a "Smallstep ACME registration authority for CAS" deployment
144144

145145
1. Select "Smallstep ACME Registration Authority for CAS" from GCP marketplace
146146
and hit the `Launch` button.

ssh/how-it-works.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ The Smallstep SSH SaaS offering includes a hosted certificate authority and a se
103103

104104
### Smallstep SSH run anywhere
105105

106-
The same offering is available in an on-premise configuration that brings the simplicity of a SaaS offering with a private deployment's control and security. Smallstep SSH Run Anywhere installs in Kubernetes and integrates with your existing HSM for storage of private keys. [Contact Us](https://smallstep.com/pricing-question) for more information.
106+
The same offering is available in an on-premises configuration that brings the simplicity of a SaaS offering with a private deployment's control and security. Smallstep SSH Run Anywhere installs in Kubernetes and integrates with your existing HSM for storage of private keys. [Contact Us](https://smallstep.com/pricing-question) for more information.
107107

108108
## Setup and configuration
109109

step-ca/installation.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Community-maintained packages for NixOS are available:
172172
- [`step-ca`](https://search.nixos.org/packages?show=step-ca&from=0&size=50&sort=relevance&query=step-ca)
173173
- [`step-cli`](https://search.nixos.org/packages?show=step-cli&from=0&size=50&sort=relevance&query=step-cli)
174174

175-
#### Freebsd
175+
#### FreeBSD
176176

177177
Community-maintained packages for FreeBSD are available:
178178
- [`step-certificates`](https://www.freshports.org/security/step-certificates/)

step-ca/provisioners.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -613,7 +613,7 @@ Valid from: 2019-06-20T18:21:52Z
613613
to: 2019-06-21T18:21:52Z`}
614614
</CodeBlock>
615615

616-
#### Configuring your identity provider (idp)
616+
#### Configuring your identity provider (IdP)
617617

618618
When creating an OAuth app, there isn't much to configure on the IdP.
619619
Most providers will ask you to specify a Redirect URI, where the ID token will be delivered at the end of the OAuth flow.
@@ -1152,7 +1152,7 @@ TPMs also have privacy constraints and a wide range of use case-specific validat
11521152
</div>
11531153
</Alert>
11541154

1155-
#### ACME for wire messenger clients
1155+
#### ACME for Wire messenger clients
11561156

11571157
<Alert severity="warning">
11581158
<div>
@@ -1450,7 +1450,7 @@ but _you cannot assume that the names on the certificate are authentic_.
14501450

14511451
Because of this, every host in your infrastructure must be trusted.
14521452

1453-
#### Mitigating the risk of iids
1453+
#### Mitigating the risk of IIDs
14541454

14551455
Here are some things you can do to mitigate risk when using IIDs:
14561456
- **Configure the provisioner with `instanceAge`.**

0 commit comments

Comments
 (0)