You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/client-concepts/certificates/working-with-certificates.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ public class AllowAllCertificatesCluster : SslAndKpiXPackCluster
80
80
If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
81
81
that can assert that a certificate the server presents is one that came from the local CA.
82
82
83
-
If you use X-Pack's {ref_current}/certutil.html`certutil` tool] to generate SSL certificates, the generated node certificate
83
+
If you use X-Pack's {ref_current}/certutil.html[+certutil+ tool] to generate SSL certificates, the generated node certificate
84
84
does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
85
85
the certificate the server presented was generated using it
86
86
@@ -115,7 +115,7 @@ the local CA certificate is part of the chain that was used to generate the serv
115
115
==== Client Certificates
116
116
117
117
X-Pack also allows you to configure a {xpack_current}/pki-realm.html[PKI realm] to enable user authentication
118
-
through client certificates. The {ref_current}/certutil.html`certutil` tool] included with X-Pack allows you to
118
+
through client certificates. The {ref_current}/certutil.html[+certutil+ tool] included with X-Pack allows you to
119
119
generate client certificates as well and assign the distinguished name (DN) of the
0 commit comments