Skip to content

Commit b04b537

Browse files
committed
Link fixes
1 parent a05df5a commit b04b537

File tree

5 files changed

+9
-7
lines changed

5 files changed

+9
-7
lines changed

graphics/workspace-one-api-panel.png

213 KB
Loading

step-ca/basic-certificate-authority-operations.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
---
2+
updated_at: May 19, 2025
23
title: Basic Certificate Authority Operations
34
html_title: basic certificate authority operations
45
description: Learn about the basic certificate authority operations of step-ca
@@ -229,7 +230,7 @@ In this section we'll go over the basics of issuing and renewing SSH certificate
229230
### Background
230231

231232
SSH certificates are not X.509 certificates.
232-
Instead, they follow an [SSH-specific certificate format](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys).
233+
Instead, they follow an [SSH-specific certificate format](https://datatracker.ietf.org/doc/draft-miller-ssh-cert/).
233234

234235
Mercifully, they are a lot simpler than X.509:
235236
- SSH supports only User certificates and Host certificates.

tutorials/acme-protocol-acme-clients.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
---
2+
updated_at: May 19, 2025
23
title: Configure popular ACME clients to use a private CA with the ACME protocol
34
html_title: Configure ACME clients to use a private CA with the ACME protocol
45
description: Connect popular ACME clients to a private ACME server with this ACME protocol client configuration tutorial.
@@ -217,7 +218,7 @@ sudo LEGO_CA_CERTIFICATES="$(step path)/certs/root_ca.crt" \
217218
-s https://ca.internal/acme/acme/directory --http run
218219
```
219220

220-
Like `certbot`, `lego` can solve the `http-01` challenge in [_standalone_ mode](https://go-acme.github.io/lego/usage/cli/obtain-a-certificate/index.html#using-the-built-in-web-server) and [_webroot_ mode](hhttps://go-acme.github.io/lego/usage/cli/obtain-a-certificate/index.html#using-an-existing-running-web-server).
221+
Like `certbot`, `lego` can solve the `http-01` challenge in [_standalone_ mode](https://go-acme.github.io/lego/usage/cli/obtain-a-certificate/index.html#using-the-built-in-web-server) and [_webroot_ mode](https://go-acme.github.io/lego/usage/cli/obtain-a-certificate/index.html#using-an-existing-running-web-server).
221222
It can also solve the `dns-01` challenge for [many DNS providers](https://go-acme.github.io/lego/dns/index.html).
222223

223224
You can [renew the certificates](https://go-acme.github.io/lego/usage/cli/renew-a-certificate/index.html) you've installed using `lego` by running:

tutorials/connect-workspace-one-to-smallstep.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
updated_at: May 14, 2025
2+
updated_at: May 19, 2025
33
title: Connect Workspace One UEM to Smallstep
44
html_title: Connect Workspace One to Smallstep
55
description: Configure Workspace One UEM to deploy the Smallstep Agent and distribute certificates and configuration to clients.
@@ -28,7 +28,7 @@ First, we’ll create a scoped API role for Smallstep:
2828
2. Create a role named “Smallstep” with a description of “Smallstep Integration”
2929
3. Smallstep needs Read access to Devices, using the REST API. Choose API → REST on the left, and choose ✅ Read for the row “Devices”
3030

31-
![Workspace ONE API Panel](workspace-one/api-panel.png)
31+
![Workspace ONE API Panel](workspace-one-api-panel.png)
3232

3333
4. Choose **Save**
3434

@@ -125,7 +125,7 @@ In this step, we’ll tie everything together by creating Windows policy to enro
125125
- Challenge Basic Authentication Username
126126
- Challenge Basic Authentication Password
127127

128-
If you need to retrieve these again, you can always visit: [**Settings → Device Management](https://smallstep.com/app/?next=/settings/devices) → Omnissa Workspace ONE**
128+
If you need to retrieve these again, you can always visit: **[Settings → Device Management](https://smallstep.com/app/?next=/settings/devices) → Omnissa Workspace ONE**
129129

130130
#### Add a Workspace ONE CA resource
131131

tutorials/wifi-setup-guide.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure 802.1x EAP-TLS WPA-Enterprise Wi-Fi on your Access Point
3-
updated_at: March 11, 2024
3+
updated_at: May 19, 2025
44
html_title: Configure your Wi-Fi Access Point to use Enterprise EAP-TLS certificate-based authentication with Smallstep
55
description: This tutorial describes how to set up Smallstep's certificate-based Wi-Fi on several popular Access Point models
66
---
@@ -171,7 +171,7 @@ Your 802.1x EAP-TLS WPA-Enterprise Wi-Fi network is ready for use.
171171

172172
## Configure 802.1x EAP-TLS WPA-Enterprise Wi-Fi on Aruba
173173

174-
*Note: These instructions follow setup for Aruba mobility controllers wireless AP portals. See [Aruba reference WLAN configuration documentation](https://www.arubanetworks.com/techdocs/ArubaOS_86_Web_Help/Content/arubaos-solutions/virtual-ap/basi-wlan-conf-work.htm)*
174+
*Note: These instructions follow setup for Aruba mobility controllers wireless AP portals. See [Aruba reference WLAN configuration documentation](https://arubanetworking.hpe.com/techdocs/ArubaOS_8.12.0_Web_Help/Content/arubaos-solutions/virtual-ap/wlan-conf-prof.htm)*
175175

176176
First, create a new RADIUS profile:
177177

0 commit comments

Comments
 (0)