Skip to content

Commit 5a6a8bc

Browse files
committed
Remove bad cross reference link
1 parent 245686d commit 5a6a8bc

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

docs/client-concepts/certificates/working-with-certificates.asciidoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ please modify the original csharp file found at the link and submit the PR with
1717
[[working-with-certificates]]
1818
=== Working with certificates
1919

20-
If you've enabled SSL on Elasticsearch with https://www.elastic.co/products/x-pack[X-Pack] or through a
20+
If you've enabled SSL on Elasticsearch with https://www.elastic.co/products/shield[Shield] or through a
2121
proxy in front of Elasticsearch, and the Certificate Authority (CA)
2222
that generated the certificate is trusted by the machine running the client code, there should be nothing you'll have to do to talk
2323
to the cluster over HTTPS with the client.
@@ -84,8 +84,7 @@ public class AllowAllCertificatesCluster : ClusterBase
8484
If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
8585
that can assert that a certificate the server presents is one that came from the local CA.
8686

87-
If you use X-Pack's `certgen` tool to {xpack_current}/ssl-tls.html[generate SSL certificates], the generated node certificate
88-
does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
87+
Some certificates do not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
8988
the certificate the server presented was generated using it
9089

9190
[source,csharp]

src/Tests/ClientConcepts/Certificates/WorkingWithCertificates.doc.cs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ namespace Tests.ClientConcepts.Certificates
1515
{
1616
/**=== Working with certificates
1717
*
18-
* If you've enabled SSL on Elasticsearch with https://www.elastic.co/products/x-pack[X-Pack] or through a
18+
* If you've enabled SSL on Elasticsearch with https://www.elastic.co/products/shield[Shield] or through a
1919
* proxy in front of Elasticsearch, and the Certificate Authority (CA)
2020
* that generated the certificate is trusted by the machine running the client code, there should be nothing you'll have to do to talk
2121
* to the cluster over HTTPS with the client.
@@ -80,8 +80,7 @@ public override ConnectionSettings ClusterConnectionSettings(ConnectionSettings
8080
* If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
8181
* that can assert that a certificate the server presents is one that came from the local CA.
8282
*
83-
* If you use X-Pack's `certgen` tool to {xpack_current}/ssl-tls.html[generate SSL certificates], the generated node certificate
84-
* does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use
83+
* Some certificates do not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use
8584
* `CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
8685
* the certificate the server presented was generated using it
8786
*/

0 commit comments

Comments
 (0)