This is an automated email from the ASF dual-hosted git repository.

junrao pushed a commit to branch trunk
in repository https://gitbox.apache.org/repos/asf/kafka.git


The following commit(s) were added to refs/heads/trunk by this push:
     new 15e896a5b36 Fix typos in security.html (#13480)
15e896a5b36 is described below

commit 15e896a5b36bc6074830aa5900ab9e466e920082
Author: Andreas Maechler <[email protected]>
AuthorDate: Mon Apr 3 15:28:25 2023 -0600

    Fix typos in security.html (#13480)
    
    Reviewers: Divij Vaidya <[email protected]>,  Jun Rao <[email protected]>
---
 docs/security.html | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/docs/security.html b/docs/security.html
index e5d63ca1eaa..69bb2fa39db 100644
--- a/docs/security.html
+++ b/docs/security.html
@@ -402,7 +402,7 @@ keyUsage               = digitalSignature, 
keyEncipherment</code></pre>
             If private key is encrypted using a password, the key password 
must be provided in <code>ssl.key.password</code>. Private keys may be provided
             in unencrypted form without a password. In production deployments, 
configs should be encrypted or
             externalized using password protection feature in Kafka in this 
case. Note that the default SSL engine factory has limited capabilities for 
decryption
-            of encrypted private keys when external tools like OpenSSL are 
used for encryption. Third party libraries like BouncyCastle may be integrated 
witn a
+            of encrypted private keys when external tools like OpenSSL are 
used for encryption. Third party libraries like BouncyCastle may be integrated 
with a
             custom <code>SslEngineFactory</code> to support a wider range of 
encrypted private keys.</p>
 
         </li>
@@ -417,7 +417,7 @@ keyUsage               = digitalSignature, 
keyEncipherment</code></pre>
 
             <ol>
                 <li><b><a 
href="https://tools.ietf.org/html/rfc5280#section-4.2.1.12";>Extended Key 
Usage</a></b><br>Certificates may contain an extension
-                    field that controls the purpose for which the certificate 
can be used. If this field is empty, there are no restricitions on the usage,
+                    field that controls the purpose for which the certificate 
can be used. If this field is empty, there are no restrictions on the usage,
                     but if any usage is specified in here, valid SSL 
implementations have to enforce these usages.<br>
                     Relevant usages for Kafka are:
                     <ul>
@@ -431,7 +431,7 @@ keyUsage               = digitalSignature, 
keyEncipherment</code></pre>
                 <li><b>Intermediate Certificates</b><br>
                     Corporate Root CAs are often kept offline for security 
reasons. To enable day-to-day usage, so called intermediate CAs are created, 
which
                     are then used to sign the final certificates. When 
importing a certificate into the keystore that was signed by an intermediate CA 
it is
-                    necessarry to provide the entire chain of trust up to the 
root CA. This can be done by simply <i>cat</i>ing the certificate files into one
+                    necessary to provide the entire chain of trust up to the 
root CA. This can be done by simply <i>cat</i>ing the certificate files into one
                     combined certificate file and then importing this with 
keytool.
                 </li>
                 <li><b>Failure to copy extension fields</b><br>

Reply via email to