Skip to content

Commit

Permalink
Merge pull request #2612 from OctopusDeploy/ianr/fix-typo-on-security…
Browse files Browse the repository at this point in the history
…-page

Fix typo on Security page
  • Loading branch information
iryan2 authored Jan 22, 2025
2 parents 77661ec + 1d09649 commit 959caea
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions src/pages/docs/security/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ We pride ourselves on making Octopus Deploy a secure product. The security and i

This section provides information about the responsibility we take to provide a secure software product, and considerations for you as the host and administrator of your Octopus Deploy installation.

## Our Certifications
## Our Certifications

Octopus Deploy is compliant with cybersecurity standards such as ISO27001 & SOC II. Every year Octopus undergoes a security review conducted by a third-party company. We also run several public bug bounty programs to encourage the security community to help us keep our customers safer. We are an active member of MITRE through its CVE program as a CNA, meaning that we're responsible for disclosing any vulnerabilities in our product to allow customers security teams to make informed decisions.

Expand Down Expand Up @@ -103,7 +103,7 @@ The following sections describe the security controls you can put in place when

### Identity and access control

Before a person can access your Octopus Deploy installation, they must validate their identity. We provide built-in support for the most commonly used authentication providers including Active Directory (NTLM and Kerberos), Google Apps, and Microsoft Azure Active Directory. Octopus Deploy works natively with Open ID Connect (OIDC) so you can connect to other identity providers. If you don't want to use an external identity providers, you can let Octopus Deploy securely manage your usernames and passwords for you.
Before a person can access your Octopus Deploy installation, they must validate their identity. We provide built-in support for the most commonly used authentication providers including Active Directory (NTLM and Kerberos), Google Apps, and Microsoft Azure Active Directory. Octopus Deploy works natively with Open ID Connect (OIDC) so you can connect to other identity providers. If you don't want to use an external identity provider, you can let Octopus Deploy securely manage your usernames and passwords for you.

Learn about [authentication providers](/docs/security/authentication).

Expand Down

0 comments on commit 959caea

Please sign in to comment.