Skip to content

Commit a8696e2

Browse files
committed
Fix broken link
1 parent 9af1b80 commit a8696e2

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/client-concepts/certificates/working-with-certificates.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ public class AllowAllCertificatesCluster : SslAndKpiXPackCluster
8080
If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
8181
that can assert that a certificate the server presents is one that came from the local CA.
8282

83-
If you use X-Pack's {ref_current}/certutil.html`certutil` tool] to generate SSL certificates, the generated node certificate
83+
If you use X-Pack's {ref_current}/certutil.html[+certutil+ tool] to generate SSL certificates, the generated node certificate
8484
does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
8585
the certificate the server presented was generated using it
8686

@@ -115,7 +115,7 @@ the local CA certificate is part of the chain that was used to generate the serv
115115
==== Client Certificates
116116

117117
X-Pack also allows you to configure a {xpack_current}/pki-realm.html[PKI realm] to enable user authentication
118-
through client certificates. The {ref_current}/certutil.html`certutil` tool] included with X-Pack allows you to
118+
through client certificates. The {ref_current}/certutil.html[+certutil+ tool] included with X-Pack allows you to
119119
generate client certificates as well and assign the distinguished name (DN) of the
120120
certificate to a user with a certain role.
121121

0 commit comments

Comments
 (0)