Skip to content

Commit

Permalink
Update enterprise tag to be on the same line for vercel reasons.
Browse files Browse the repository at this point in the history
  • Loading branch information
kitography committed Jan 7, 2025
1 parent bf5c351 commit d5716c4
Showing 1 changed file with 4 additions and 8 deletions.
12 changes: 4 additions & 8 deletions website/content/api-docs/secret/pki/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2758,28 +2758,24 @@ do so, import a new issuer and a new `issuer_id` will be assigned.
~> **Note**: If no cluster-local address is present and templating is used,
issuance will fail.

- `disable_critical_extension_checks` `(bool: false)`
<EnterpriseAlert inline="true"/> - This determines whether this issuer is able
- `disable_critical_extension_checks` `(bool: false)` <EnterpriseAlert inline="true"/> - This determines whether this issuer is able
to issue certificates where the chain of trust (including the issued
certificate) contain critical extensions not processed by vault, breaking the
behavior required by [RFC 5280 Section 6.1](https://www.rfc-editor.org/rfc/rfc5280#section-6.1).

- `disable_path_length_checks` `(bool: false)`
<EnterpriseAlert inline="true"/> - This determines whether this issuer is able
- `disable_path_length_checks` `(bool: false)` <EnterpriseAlert inline="true"/> - This determines whether this issuer is able
to issue certificates where the chain of trust (including the final issued
certificate) is longer than allowed by a certificate authority in that chain,
breaking the behavior required by
[RFC 5280 Section 4.2.1.9](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.9).

- `disable_name_checks` `(bool: false)`
<EnterpriseAlert inline="true"/> - This determines whether this issuer is able
- `disable_name_checks` `(bool: false)` <EnterpriseAlert inline="true"/> - This determines whether this issuer is able
to issue certificates where the chain of trust (including the final issued
certificate) contains a link in which the subject of the issuing certificate
does not match the named issuer of the certificate it signed, breaking the
behavior required by [RFC 5280 Section 4.1.2.4](https://www.rfc-editor.org/rfc/rfc5280#section-4.1.2.4).

- `disable_name_constraint_checks` `(bool: false)`
<EnterpriseAlert inline="true"/> - This determines whether this issuer is able
- `disable_name_constraint_checks` `(bool: false)` <EnterpriseAlert inline="true"/> - This determines whether this issuer is able
to issue certificates where the chain of trust (including the final issued
certificate) violates the name constraints critical extension of one of the
issuer certificates in the chain, breaking the behavior required by
Expand Down

0 comments on commit d5716c4

Please sign in to comment.