From d5716c41d076cf067c0943a0ad57f7fb65776e55 Mon Sep 17 00:00:00 2001 From: kitography Date: Tue, 7 Jan 2025 12:14:54 -0500 Subject: [PATCH] Update enterprise tag to be on the same line for vercel reasons. --- website/content/api-docs/secret/pki/index.mdx | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-) diff --git a/website/content/api-docs/secret/pki/index.mdx b/website/content/api-docs/secret/pki/index.mdx index 8aecbc2db60f..889438116e08 100644 --- a/website/content/api-docs/secret/pki/index.mdx +++ b/website/content/api-docs/secret/pki/index.mdx @@ -2758,28 +2758,24 @@ do so, import a new issuer and a new `issuer_id` will be assigned. ~> **Note**: If no cluster-local address is present and templating is used, issuance will fail. -- `disable_critical_extension_checks` `(bool: false)` - - This determines whether this issuer is able +- `disable_critical_extension_checks` `(bool: false)` - This determines whether this issuer is able to issue certificates where the chain of trust (including the issued certificate) contain critical extensions not processed by vault, breaking the behavior required by [RFC 5280 Section 6.1](https://www.rfc-editor.org/rfc/rfc5280#section-6.1). -- `disable_path_length_checks` `(bool: false)` - - This determines whether this issuer is able +- `disable_path_length_checks` `(bool: false)` - This determines whether this issuer is able to issue certificates where the chain of trust (including the final issued certificate) is longer than allowed by a certificate authority in that chain, breaking the behavior required by [RFC 5280 Section 4.2.1.9](https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.9). -- `disable_name_checks` `(bool: false)` - - This determines whether this issuer is able +- `disable_name_checks` `(bool: false)` - This determines whether this issuer is able to issue certificates where the chain of trust (including the final issued certificate) contains a link in which the subject of the issuing certificate does not match the named issuer of the certificate it signed, breaking the behavior required by [RFC 5280 Section 4.1.2.4](https://www.rfc-editor.org/rfc/rfc5280#section-4.1.2.4). -- `disable_name_constraint_checks` `(bool: false)` - - This determines whether this issuer is able +- `disable_name_constraint_checks` `(bool: false)` - This determines whether this issuer is able to issue certificates where the chain of trust (including the final issued certificate) violates the name constraints critical extension of one of the issuer certificates in the chain, breaking the behavior required by