From b01e84d495e6b2f3f1a92a2971501d77937e45c7 Mon Sep 17 00:00:00 2001 From: Ian Ryan Date: Wed, 22 Jan 2025 15:54:20 +1000 Subject: [PATCH 1/2] Remove grammatically incorrect plural "providers" -> "provider" --- src/pages/docs/security/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/pages/docs/security/index.md b/src/pages/docs/security/index.md index 495893223a..cefb03c625 100644 --- a/src/pages/docs/security/index.md +++ b/src/pages/docs/security/index.md @@ -103,7 +103,7 @@ The following sections describe the security controls you can put in place when ### Identity and access control -Before a person can access your Octopus Deploy installation, they must validate their identity. We provide built-in support for the most commonly used authentication providers including Active Directory (NTLM and Kerberos), Google Apps, and Microsoft Azure Active Directory. Octopus Deploy works natively with Open ID Connect (OIDC) so you can connect to other identity providers. If you don't want to use an external identity providers, you can let Octopus Deploy securely manage your usernames and passwords for you. +Before a person can access your Octopus Deploy installation, they must validate their identity. We provide built-in support for the most commonly used authentication providers including Active Directory (NTLM and Kerberos), Google Apps, and Microsoft Azure Active Directory. Octopus Deploy works natively with Open ID Connect (OIDC) so you can connect to other identity providers. If you don't want to use an external identity provider, you can let Octopus Deploy securely manage your usernames and passwords for you. Learn about [authentication providers](/docs/security/authentication). From 1d0964962466a9582d89853deba049a26d27621c Mon Sep 17 00:00:00 2001 From: Ian Ryan Date: Wed, 22 Jan 2025 15:55:29 +1000 Subject: [PATCH 2/2] Trim trailing whitespace --- src/pages/docs/security/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/pages/docs/security/index.md b/src/pages/docs/security/index.md index cefb03c625..ef35fb3ff1 100644 --- a/src/pages/docs/security/index.md +++ b/src/pages/docs/security/index.md @@ -13,7 +13,7 @@ We pride ourselves on making Octopus Deploy a secure product. The security and i This section provides information about the responsibility we take to provide a secure software product, and considerations for you as the host and administrator of your Octopus Deploy installation. -## Our Certifications +## Our Certifications Octopus Deploy is compliant with cybersecurity standards such as ISO27001 & SOC II. Every year Octopus undergoes a security review conducted by a third-party company. We also run several public bug bounty programs to encourage the security community to help us keep our customers safer. We are an active member of MITRE through its CVE program as a CNA, meaning that we're responsible for disclosing any vulnerabilities in our product to allow customers security teams to make informed decisions.