This is an automated email from the ASF dual-hosted git repository.
acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git
The following commit(s) were added to refs/heads/main by this push:
new 0bb7808bacc8 CAMEL-22669 - remove the link for the moment (#19844)
0bb7808bacc8 is described below
commit 0bb7808bacc8698db447667d96efd7167e12843f
Author: Andrea Cosentino <[email protected]>
AuthorDate: Fri Nov 7 10:44:37 2025 +0100
CAMEL-22669 - remove the link for the moment (#19844)
Signed-off-by: Andrea Cosentino <[email protected]>
---
docs/user-manual/modules/ROOT/pages/security.adoc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/user-manual/modules/ROOT/pages/security.adoc
b/docs/user-manual/modules/ROOT/pages/security.adoc
index fe16a4dc21af..1fe9ba02cd65 100644
--- a/docs/user-manual/modules/ROOT/pages/security.adoc
+++ b/docs/user-manual/modules/ROOT/pages/security.adoc
@@ -74,7 +74,7 @@ The following _Vaults_ are supported by Camel:
* xref:components::google-secret-manager-component.adoc[Google Secret Manager]
* xref:components::azure-key-vault-component.adoc[Azure Key Vault]
* xref:components::hashicorp-vault-component.adoc[Hashicorp Vault]
-* xref:next@components::cyberark-vault-component.adoc[CyberArk Conjur]
+* CyberArk Conjur
==== Using AWS Vault
@@ -867,7 +867,7 @@ This approach will return the route secret value with
version '2' or default val
This approach will return the username field of the database secret with
version '2' or admin in case the secret doesn't exist or the version doesn't
exist.
-NOTE: CyberArk Conjur requires secrets (variables) to be defined in a policy
file before they can be set. See the
xref:next@components::cyberark-vault-component.adoc[CyberArk Vault component
documentation] for details on setting up policies.
+NOTE: CyberArk Conjur requires secrets (variables) to be defined in a policy
file before they can be set.
The only requirement is adding the camel-cyberark-vault jar to your Camel
application.