Skip to content

Commit

Permalink
Merge branch 'master' into anax-v2.12-newenvvar-cli
Browse files Browse the repository at this point in the history
  • Loading branch information
anaxceron authored Dec 4, 2023
2 parents 0e73e06 + 7599d48 commit 87ae627
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 5 deletions.
3 changes: 3 additions & 0 deletions .github/dco.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
allowRemediationCommits:
individual: true
thirdParty: true
10 changes: 5 additions & 5 deletions docs/user-guide/certificate-configuration-scenarios.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ Ensure that all alias values for all scenarios use only lower-case.

## Scenario 1: Use a file-based (PKCS12) keystore with Zowe generated certificates

Use the following procedure to configure your yaml file to enable Zowe to use generated PKCS12 certificates to be used with a keystore directory to store your certificates.
Use the following procedure to configure the `zowe.setup` section in your yaml file to enable Zowe to use generated PKCS12 certificates to be used with a keystore directory to store your certificates.

1. Set the `type` of the certificate storage to `PKCS12`.

Expand Down Expand Up @@ -133,7 +133,7 @@ Check out the [video tutorials](https://www.youtube.com/playlist?list=PL8REpLGaY
## Scenario 2: Use a file-based (PKCS12) keystore and import a certificate generated by another CA
Use the following procedure to configure your yaml file to enable Zowe to use a file-based PKCS12 keystore to import a certificate generted by another CA.
Use the following procedure to configure the `zowe.setup` section in your yaml file to enable Zowe to use a file-based PKCS12 keystore to import a certificate generted by another CA.
1. Set the `type` of the certificate storage to `PKCS12`.
Expand Down Expand Up @@ -191,7 +191,7 @@ PEM format certificate authorities can be imported and trusted.
```
Your yaml file is now configured to enable Zowe to use a file-based PKCS12 keystore to import a certificate generted by another CA.
## Scenario 3: Use a z/OS keyring-based keystore with Zowe generated certificates
Use the following procedure to configure your yaml file to enable Zowe to use a z/OS keyring-based keystore with Zowe generated certificates.
Use the following procedure to configure the `zowe.setup` section in your yaml file to enable Zowe to use a z/OS keyring-based keystore with Zowe generated certificates.
1. Set the `type` of the certificate storage to one of the following keyring types:
Expand Down Expand Up @@ -269,7 +269,7 @@ Due to the limitation of the `RACDCERT` command, this field should contain exact
Your yaml file is now configured to enable Zowe to use a z/OS keyring-based keystore with Zowe generated certificates.
## Scenario 4: Use a z/OS keyring-based keystore and connect to an existing certificate
Use the following procedure to configure your yaml file to use a z/OS keyring-based keystore and connect to an existing certificate.
Use the following procedure to configure the `zowe.setup` section in your yaml file to use a z/OS keyring-based keystore and connect to an existing certificate.
1. Set the `type` of the certificate storage to one of the following keyring types:
Expand Down Expand Up @@ -329,7 +329,7 @@ If you would like to use this example in your Zowe configuration YAML file, repl
Your yaml file is now configured to use a z/OS keyring-based keystore and connect to an existing certificate.
## Scenario 5: Use a z/OS keyring-based keystore and import a certificate stored in a data set
Use the following procedure to configure your yaml file to use a z/OS keyring-based keystore and import a certificate stored in a data set.
Use the following procedure to configure the `zowe.setup` section in your yaml file to use a z/OS keyring-based keystore and import a certificate stored in a data set.
1. Set the `type` of the certificate storage to one of the following keyring types:
Expand Down

0 comments on commit 87ae627

Please sign in to comment.