Skip to content

Commit c7ed6cd

Browse files
authored
[DX-1437] organise --> organize (PR 1) (#5065)
* organise 1 * organise fix 1 * revert email-customization.md changes
1 parent 81eb3ad commit c7ed6cd

28 files changed

+79
-79
lines changed

tyk-docs/content/basic-config-and-security.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ This section covers methods for configuring and applying security methods to Tyk
1515
- [Control and limit traffic]({{< ref "basic-config-and-security/control-limit-traffic" >}}). This section shows you how to apply quotas, rate limits (throttling) and size limits to your APIs.
1616
- [Reduce latency]({{< ref "basic-config-and-security/reduce-latency" >}}). This section describes methods for reducing latency in your Tyk installation.
1717
- [Log traffic]({{< ref "product-stack/tyk-gateway/basic-config-and-security/logging-api-traffic/logging-api-traffic" >}}). This section describes how to control the capture of traffic logs for the transactions (API requests and responses) handled by your Tyk Gateways.
18-
- [Report, monitor and trigger events]({{< ref "basic-config-and-security/report-monitor-trigger-events" >}}). This section describes what event data you can include in your APIs, and how you can do manage them with the use of webhooks and custom JavaScript handlers. This section also cover the use of monitors for user and organisation quotas, as well as StatsD and NewRelic instrumentation.
18+
- [Report, monitor and trigger events]({{< ref "basic-config-and-security/report-monitor-trigger-events" >}}). This section describes what event data you can include in your APIs, and how you can do manage them with the use of webhooks and custom JavaScript handlers. This section also cover the use of monitors for user and organization quotas, as well as StatsD and NewRelic instrumentation.

tyk-docs/content/shared/api-def-common.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
* `session_lifetime_respects_key_expiration`: If this is set to `true` and the key expiration date is less than the `session_lifetime`, the key expiration value will be set to `session_lifetime`. Don't forget that the key expiration is set in unix timestamp but `session_lifetime` is set in seconds. Also, `session_lifetime_respects_key_expiration` exists in the global config too. When the global one is set to `true`, the one set at the API level will be ignored.
2020

2121
* `domain`: The domain to bind this API to. Multiple APIs can share the same domain, so long as their listen paths are unique.
22-
This domain will affect your API only. To set up the portal domain for your organisation, please register it in the main Tyk Dashboard settings file.
22+
This domain will affect your API only. To set up the portal domain for your organization, please register it in the main Tyk Dashboard settings file.
2323
Your Tyk Gateway can listen on multiple domains/subdomains through the use of regular expressions, more precisely the RE2 Syntax. They are defined using the format `{name}` or `{name:pattern}`.
2424
* `www.example.com` Matches only if domain is www.example.com
2525
* `{subdomain:[a-z]+}.example.com` Matches dynamic subdomain

tyk-docs/content/shared/create-api-include.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ If you select the API from the list to open it again, the API URL will be displa
7777
## Tutorial: Create an API with the Dashboard API
7878

7979
It is easy to create APIs using Tyk Dashboard's own REST API.
80-
You will need an API key for your organisation (to authenticate with the Dashboard API) and issue a request using these credentials to create your new API and make it live.
80+
You will need an API key for your organization (to authenticate with the Dashboard API) and issue a request using these credentials to create your new API and make it live.
8181

8282
### Step 1: Obtain your Tyk Dashboard API access credentials key & Dashboard URL
8383

tyk-docs/content/shared/tyk-gateway-features-include.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
---
33
Tyk is an open source Enterprise API Gateway, supporting REST, GraphQL, TCP and gRPC protocols.
44

5-
Tyk Gateway is provided ‘Batteries-included’, with no feature lockout. Enabling your organisation to control who accesses your APIs, when they access, and how they access it.
5+
Tyk Gateway is provided ‘Batteries-included’, with no feature lockout. Enabling your organization to control who accesses your APIs, when they access, and how they access it.
66

7-
Tyk Technologies uses the same API Gateway for all its applications. Protecting, securing, and processing APIs for thousands of organisations and businesses around the world. Ideal for Open Banking, building software in the clouds as well as exposing APIs to teams, partners & consumers.
7+
Tyk Technologies uses the same API Gateway for all its applications. Protecting, securing, and processing APIs for thousands of organizations and businesses around the world. Ideal for Open Banking, building software in the clouds as well as exposing APIs to teams, partners & consumers.
88

99
Built from the ground up to be the fastest API gateway on the planet. It does not depend on a legacy proxy underneath. It has no 3rd party dependencies aside from Redis for distributed rate-limiting and token storage. Tyk Gateway can also be deployed as part of a larger Full Lifecycle API Management platform Tyk Self-Managed which also includes Management Control Plane, Dashboard GUI and Developer Portal.
1010

tyk-docs/content/tyk-cloud.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Configure custom domain for your Dashboard and Developer Portal
6060

6161
#### Manage environments
6262

63-
Create and manage multiple environments within your Tyk Cloud organisation
63+
Create and manage multiple environments within your Tyk Cloud organization
6464
{{< /badge >}}
6565

6666
{{< badge title="Administration" href="tyk-cloud/environments-deployments/managing-control-planes" >}}
@@ -74,7 +74,7 @@ Create and manage your Cloud Control Plane and Cloud Data Plane deployments
7474

7575
#### Manage teams & users
7676

77-
Create teams in your organisation, define roles and manage user access
77+
Create teams in your organization, define roles and manage user access
7878
{{< /badge >}}
7979

8080
{{< badge title="Account" href="tyk-cloud/account-billing/" >}}

tyk-docs/content/tyk-on-premises/ansible.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ For a production environment, we recommend that the Gateway, Dashboard and Pump
101101
| gateway.rpc.connString | | Use this setting to add the URL for your MDCB or load balancer host |
102102
| gateway.rpc.useSSL | `true` | Set this option to `true` to use an SSL RPC connection|
103103
| gateway.rpc.sslInsecureSkipVerify | `true` | Set this option to `true` to allow the certificate validation (certificate chain and hostname) to be skipped. This can be useful if you use a self-signed certificate |
104-
| gateway.rpc.rpcKey | | Your organisation ID to connect to the MDCB installation |
104+
| gateway.rpc.rpcKey | | Your organization ID to connect to the MDCB installation |
105105
| gateway.rpc.apiKey | | This the API key of a user used to authenticate and authorize the Gateway’s access through MDCB. The user should be a standard Dashboard user with minimal privileges so as to reduce any risk if the user is compromised. The suggested security settings are read for Real-time notifications and the remaining options set to deny |
106106
| gateway.rpc.groupId | | This is the `zone` that this instance inhabits, e.g. the cluster/data-center the Gateway lives in. The group ID must be the same across all the Gateways of a data-center/cluster which are also sharing the same Redis instance. This ID should also be unique per cluster (otherwise another Gateway cluster can pick up your keyspace events and your cluster will get zero updates). |
107107

tyk-docs/content/tyk-on-premises/bootstrapper-cli.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
date: 2019-07-30T11:30:02Z
33
title: Bootstrapper CLI
44
tags: ["Tyk Dasboard", "Self-Managed", "Bootstrapping", "CLI"]
5-
description: "How to Bootstrap the Tyk Dashboard to create your organisation and users"
5+
description: "How to Bootstrap the Tyk Dashboard to create your organization and users"
66
menu:
77
main:
88
parent: "Self-Managed Installation"
@@ -33,7 +33,7 @@ To list the available flags, execute `tyk-analytics bootstrap -h`:
3333

3434
### Description
3535

36-
The `bootstrap` command makes bootstrapping easier. It helps you to create organisations and users. The command needs a
36+
The `bootstrap` command makes bootstrapping easier. It helps you to create organizations and users. The command needs a
3737
config file path. By default, it looks at `tyk_analytics.conf` in the directory where the `tyk-analytics` binary is located.
3838
For example:
3939

tyk-docs/content/tyk-on-premises/debian-ubuntu.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ You can choose to not install Redis, MongoDB or PostgreSQL by removing the `-t r
9797
| gateway.rpc.connString | | Use this setting to add the URL for your MDCB or load balancer host |
9898
| gateway.rpc.useSSL | `true` | Set this option to `true` to use an SSL RPC connection|
9999
| gateway.rpc.sslInsecureSkipVerify | `true` | Set this option to `true` to allow the certificate validation (certificate chain and hostname) to be skipped. This can be useful if you use a self-signed certificate |
100-
| gateway.rpc.rpcKey | | Your organisation ID to connect to the MDCB installation |
100+
| gateway.rpc.rpcKey | | Your organization ID to connect to the MDCB installation |
101101
| gateway.rpc.apiKey | | This the API key of a user used to authenticate and authorize the Gateway’s access through MDCB. The user should be a standard Dashboard user with minimal privileges so as to reduce any risk if the user is compromised. The suggested security settings are read for Real-time notifications and the remaining options set to deny |
102102
| gateway.rpc.groupId | | This is the `zone` that this instance inhabits, e.g. the cluster/data-center the Gateway lives in. The group ID must be the same across all the Gateways of a data-center/cluster which are also sharing the same Redis instance. This ID should also be unique per cluster (otherwise another Gateway cluster can pick up your keyspace events and your cluster will get zero updates). |
103103

tyk-docs/content/tyk-on-premises/debian-ubuntu/dashboard.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ sudo systemctl enable tyk-dashboard
260260

261261
Follow the [Gateway installation instructions]({{< ref "tyk-on-premises/debian-ubuntu/gateway" >}}) to connect to your Dashboard instance before you continue on to step 4.
262262

263-
### Step 4: Bootstrap the Tyk Dashboard with an initial User and Organisation
263+
### Step 4: Bootstrap the Tyk Dashboard with an initial User and Organization
264264

265265
Go to:
266266

@@ -272,12 +272,12 @@ You should get to the Tyk Dashboard Setup screen:
272272

273273
{{< img src="/img/dashboard/system-management/bootstrap_screen.png" alt="Tyk Dashboard Bootstrap Screen" >}}
274274

275-
### Step 5 - Create your Organisation and Default User
275+
### Step 5 - Create your Organization and Default User
276276

277277
You need to enter the following:
278278

279-
- Your **Organisation Name**
280-
- Your **Organisation Slug**
279+
- Your **Organization Name**
280+
- Your **Organization Slug**
281281
- Your User **Email Address**
282282
- Your User **First and Last Name**
283283
- A **Password** for your User

tyk-docs/content/tyk-on-premises/debian-ubuntu/gateway.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ $ ansible-playbook playbook.yaml -t `tyk-gateway-pro` or `tyk-gateway-hybrid`
7373
| gateway.rpc.connString | | Use this setting to add the URL for your MDCB or load balancer host |
7474
| gateway.rpc.useSSL | `true` | Set this option to `true` to use an SSL RPC connection|
7575
| gateway.rpc.sslInsecureSkipVerify | `true` | Set this option to `true` to allow the certificate validation (certificate chain and hostname) to be skipped. This can be useful if you use a self-signed certificate |
76-
| gateway.rpc.rpcKey | | Your organisation ID to connect to the MDCB installation |
76+
| gateway.rpc.rpcKey | | Your organization ID to connect to the MDCB installation |
7777
| gateway.rpc.apiKey | | This the API key of a user used to authenticate and authorize the Gateway’s access through MDCB. The user should be a standard Dashboard user with minimal privileges so as to reduce any risk if the user is compromised. The suggested security settings are read for Real-time notifications and the remaining options set to deny |
7878
| gateway.rpc.groupId | | This is the `zone` that this instance inhabits, e.g. the cluster/data-center the Gateway lives in. The group ID must be the same across all the Gateways of a data-center/cluster which are also sharing the same Redis instance. This ID should also be unique per cluster (otherwise another Gateway cluster can pick up your keyspace events and your cluster will get zero updates). |
7979

tyk-docs/content/tyk-on-premises/docker/docker-pro-demo.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -79,17 +79,17 @@ This will will download and setup the five Docker containers. This may take some
7979

8080
### Step #5 - Bootstrap the Tyk installation
8181

82-
Go to [http://localhost:3000](http://localhost:3000) in your browser. You will be presented with the Bootstrap UI to create your first organisation and admin user.
82+
Go to [http://localhost:3000](http://localhost:3000) in your browser. You will be presented with the Bootstrap UI to create your first organization and admin user.
8383

8484
{{< img src="/img/dashboard/system-management/tyk-bootstrap.png" alt="Tyk Bootstrap sceen" width="768">}}
8585

8686

87-
### Step #6 - Create your organisation and default user
87+
### Step #6 - Create your organization and default user
8888

8989
You need to enter the following:
9090

91-
* Your **Organisation Name**
92-
* Your **Organisation Slug**
91+
* Your **Organization Name**
92+
* Your **Organization Slug**
9393
* Your User **Email Address**
9494
* Your User **First and Last Name**
9595
* A **Password** for your User

tyk-docs/content/tyk-on-premises/docker/docker-pro-demo/docker-pro-demo-windows.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -83,12 +83,12 @@ You should get to the Tyk Dashboard Setup screen:
8383

8484
{{< img src="/img/dashboard/system-management/bootstrap_screen.png" alt="Tyk Dashboard Bootstrap Screen" >}}
8585

86-
### Step Six - Create your Organisation and Default User
86+
### Step Six - Create your Organization and Default User
8787

8888
You need to enter the following:
8989

90-
- Your **Organisation Name**
91-
- Your **Organisation Slug**
90+
- Your **Organization Name**
91+
- Your **Organization Slug**
9292
- Your User **Email Address**
9393
- Your User **First and Last Name**
9494
- A **Password** for your User

tyk-docs/content/tyk-on-premises/docker/docker-pro-demo/docker-pro-wsl.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -94,12 +94,12 @@ You should get to the Tyk Dashboard Setup screen:
9494

9595
{{< img src="/img/dashboard/system-management/bootstrap_screen.png" alt="Tyk Dashboard Bootstrap Screen" >}}
9696

97-
### Step Seven - Create your Organisation and Default User
97+
### Step Seven - Create your Organization and Default User
9898

9999
You need to enter the following:
100100

101-
- Your **Organisation Name**
102-
- Your **Organisation Slug**
101+
- Your **Organization Name**
102+
- Your **Organization Slug**
103103
- Your User **Email Address**
104104
- Your User **First and Last Name**
105105
- A **Password** for your User

tyk-docs/content/tyk-on-premises/installation/on-heroku.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ However, it doesn't yet have any accounts. It order to populate it please run th
265265
dashboard/bootstrap.sh evening-beach-40625.herokuapp.com
266266
```
267267
```
268-
Creating Organisation
268+
Creating Organization
269269
ORGID: 5b016ca530867500050b9e90
270270
Adding new user
271271
USER AUTH: a0f7c1e878634a60599dc037489a880f
@@ -279,7 +279,7 @@ User: [email protected]
279279
Pass: test123
280280
```
281281

282-
It will generate a default organisation with random admin username and a specified password. The bootstrap script can be edited to suit your needs as well as just editing the user info in the dashboard.
282+
It will generate a default organization with random admin username and a specified password. The bootstrap script can be edited to suit your needs as well as just editing the user info in the dashboard.
283283

284284
If this was successful, you should be able to log into your dashboard now.
285285

tyk-docs/content/tyk-on-premises/licensing.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Do you need support for centrally managing your APIs while deploying edge gatewa
5959
✅ For managing your APIs centrally while deploying edge gateways in independent clusters / regions <br />
6060
✅ For the highest availability across data centers <br />
6161
✅ For Kubernetes-based deployment in multiple cluster / multiple regions <br />
62-
✅ For larger organisations [with multiple teams]({{< ref "tyk-multi-data-centre.md" >}}) and [data sovereignty](https://tyk.io/blog/strategies-for-dealing-with-data-sovereignty-at-scale/) requirements <br />
62+
✅ For larger organizations [with multiple teams]({{< ref "tyk-multi-data-centre.md" >}}) and [data sovereignty](https://tyk.io/blog/strategies-for-dealing-with-data-sovereignty-at-scale/) requirements <br />
6363

6464
The license starts with 3 environments and 2 regions, can be extended to more environments and regions as needed.
6565

tyk-docs/content/tyk-on-premises/redhat-rhel-centos.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ You can choose to not install Redis, MongoDB or PostgreSQL by removing the `-t r
185185
| gateway.rpc.connString | | Use this setting to add the URL for your MDCB or load balancer host |
186186
| gateway.rpc.useSSL | `true` | Set this option to `true` to use an SSL RPC connection|
187187
| gateway.rpc.sslInsecureSkipVerify | `true` | Set this option to `true` to allow the certificate validation (certificate chain and hostname) to be skipped. This can be useful if you use a self-signed certificate |
188-
| gateway.rpc.rpcKey | | Your organisation ID to connect to the MDCB installation |
188+
| gateway.rpc.rpcKey | | Your organization ID to connect to the MDCB installation |
189189
| gateway.rpc.apiKey | | This the API key of a user used to authenticate and authorize the Gateway’s access through MDCB. The user should be a standard Dashboard user with minimal privileges so as to reduce any risk if the user is compromised. The suggested security settings are read for Real-time notifications and the remaining options set to deny |
190190
| gateway.rpc.groupId | | This is the `zone` that this instance inhabits, e.g. the cluster/data-center the Gateway lives in. The group ID must be the same across all the Gateways of a data-center/cluster which are also sharing the same Redis instance. This ID should also be unique per cluster (otherwise another Gateway cluster can pick up your keyspace events and your cluster will get zero updates). |
191191

tyk-docs/content/tyk-stack/tyk-developer-portal/enterprise-developer-portal/api-access/configuring-custom-rate-limit-keys.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The Tyk Enterprise Developer Portal facilitates the configuration of various rat
6363
To achieve this, the portal, by default, populates the following attributes in the credential metadata, which can be used as part of a custom rate limit key:
6464
- **ApplicationID**: The ID of the application to which the credential belongs.
6565
- **DeveloperID**: The ID of the developer who created the credential.
66-
- **OrganisationID**: The ID of the organisation to which the developer belongs.
66+
- **OrganizationID**: The ID of the organization to which the developer belongs.
6767

6868
Additionally, it's possible to attach [custom attribute values]({{< ref "product-stack/tyk-enterprise-developer-portal/portal-customisation/customise-user-model#add-attributes-to-the-user-model" >}}) defined in a developer profile as metadata fields to credentials.
6969

tyk-docs/content/tyk-stack/tyk-developer-portal/enterprise-developer-portal/customise-enterprise-portal/full-customisation/content-manager-workflow.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ If you are interested in getting access contact us at [[email protected]](<mailto:s
1616
{{< /note >}}
1717

1818
## Introduction
19-
For organisations with content manager(s) managing the developer portal content, we are recommending the following workflow.
19+
For organizations with content manager(s) managing the developer portal content, we are recommending the following workflow.
2020

2121
{{< img src="/img/dashboard/portal-management/enterprise-portal/portal-content-manager-flow.png" alt="Content manager workflow" >}}
2222

2323
The Tyk Developer portal supports the workflow of content managers who're responsible for editing and managing page content.
24-
The purpose of highlighting this flow is to give recommendations on how to organise effective workflows between front end engineers and content managers. Where front end engineers are building page templates and content managers are managing the pages and the content.
24+
The purpose of highlighting this flow is to give recommendations on how to organize effective workflows between front end engineers and content managers. Where front end engineers are building page templates and content managers are managing the pages and the content.

tyk-docs/content/tyk-stack/tyk-developer-portal/enterprise-developer-portal/customise-enterprise-portal/full-customisation/developer-workflow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,6 @@ The Tyk Enterprise Developer Portal uses themes for customizing the live portal.
2020
This section provides a complete guide to full customization from the developer's point of view.
2121

2222
## Introduction
23-
For organisations with developers customizing pages layout and other technical aspects of the portal pages, we are recommending the following workflow.
23+
For organizations with developers customizing pages layout and other technical aspects of the portal pages, we are recommending the following workflow.
2424

2525
{{< img src="/img/dashboard/portal-management/enterprise-portal/portal-fe-develop-flow.png" alt="Developer workflow" >}}

0 commit comments

Comments
 (0)