Skip to content

Commit

Permalink
Merge pull request #3874 from zowe/janan07-fix-link-in-config-via-jcl
Browse files Browse the repository at this point in the history
fix link in config via jcl
  • Loading branch information
janan07 authored Sep 13, 2024
2 parents 1fdc695 + 5a2a754 commit 43b3075
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/user-guide/configuring-zowe-via-jcl.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ In addition to core JCL samples, you can also customize JCL samples for various
Ensure that your Zowe keyring has the following elements:

* **Private key & certificate pair**
The Zowe Servers will use this certificate. Ensure that the certificate either does not have the `Extended Key Usage` attribute, or alternatively, that the certificate does have `Extended Key Usage` with both `Server Authorization` and `Client Authorization` values. For more information about extended key usage, see [Extended key usage](./configure-certificates.md/#extended-key-usage) heading in the article _Configuring certificates_.
The Zowe Servers will use this certificate. Ensure that the certificate either does not have the `Extended Key Usage` attribute, or alternatively, that the certificate does have `Extended Key Usage` with both `Server Authorization` and `Client Authorization` values. For more information about extended key usage, see [Extended key usage](./configure-certificates.md#extended-key-usage) heading in the article _Configuring certificates_.

* **Certificate Authorities**
Every intermediate and root Certificate Authority (CA) that Zowe interacts with must be within the Keyring, unless the `zowe.yaml` value `zowe.verifyCertificates` is set to `DISABLED`. CAs that must be within the keyring include z/OSMF's CAs if using z/OSMF, and Zowe's own certificate's CAs as Zowe servers must be able to verify each other.
Expand Down

0 comments on commit 43b3075

Please sign in to comment.