Skip to content

Commit 03be266

Browse files
fairclothjmschavis
andauthored
Apply suggestions from code review
Co-authored-by: Sarah Chavis <[email protected]>
1 parent 2a17c13 commit 03be266

File tree

4 files changed

+63
-60
lines changed
  • content/vault

4 files changed

+63
-60
lines changed

content/vault/v1.18.x/content/docs/secrets/ldap.mdx

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -73,28 +73,28 @@ There are many object classes that provide `userPassword` including for example:
7373

7474
### Resource access control facility (RACF)
7575

76-
To manage credentials for IBM's Resource Access Control Facility (RACF), you
77-
must configure the LDAP secrets engine with the `racf` schema. This enables
78-
specific behaviors required for RACF compatibility.
76+
To manage credentials for an IBM Resource Access Control Facility (RACF),
77+
configure the LDAP secrets engine with the `racf` schema to enable the
78+
behaviors required for RACF compatibility.
7979

80-
#### Credential Type: Password vs. Password Phrase
80+
#### Password vs. password phrase credentials
8181

82-
The engine can manage both traditional 8-character passwords and modern, longer
83-
password phrases. This is controlled by the [`credential_type`](/vault/api-docs/secret/ldap#credential_type)
84-
parameter:
82+
The LDAP plugin supports traditional 8-character passwords and modern,
83+
longer password phrases through th
84+
[`credential_type`](/vault/api-docs/secret/ldap#credential_type) parameter:
8585

86-
- `password` (Default): The engine will generate and manage standard RACF passwords.
86+
- `password` (Default): Configure the plugin to generate and manage standard RACF passwords.
8787

88-
- `phrase`: The engine will generate and manage case-sensitive password phrases.
88+
- `phrase`: Configure the plugin to generate and manage case-sensitive password phrases.
8989

90-
#### Configuring Password Rules
90+
#### Configure password rules
9191

92-
The complexity rules for generated credentials, such as length, are not
93-
controlled by the RACF schema itself. Instead, you must define and link a
94-
standard Vault [password policy](/vault/docs/concepts/password-policies).
95-
This allows you to enforce site-specific complexity requirements.
92+
The RACF schema does not control the credential complexity rules directly.
93+
To enforce site-specific complexity requirements, define and link a
94+
standard Vault [password policy](/vault/docs/concepts/password-policies)
95+
to your RACF schema.
9696

97-
#### Example Configuration
97+
#### Example configuration
9898

9999
The following example configures the LDAP engine for RACF, sets it to manage
100100
password phrases, and links a password policy to enforce length and

content/vault/v1.19.x/content/docs/secrets/ldap.mdx

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -73,28 +73,29 @@ There are many object classes that provide `userPassword` including for example:
7373

7474
### Resource access control facility (RACF)
7575

76-
To manage credentials for IBM's Resource Access Control Facility (RACF), you
77-
must configure the LDAP secrets engine with the `racf` schema. This enables
78-
specific behaviors required for RACF compatibility.
76+
To manage credentials for an IBM Resource Access Control Facility (RACF),
77+
configure the LDAP secrets engine with the `racf` schema to enable the
78+
behaviors required for RACF compatibility.
7979

80-
#### Credential Type: Password vs. Password Phrase
80+
#### Password vs. password phrase credentials
8181

82-
The engine can manage both traditional 8-character passwords and modern, longer
83-
password phrases. This is controlled by the [`credential_type`](/vault/api-docs/secret/ldap#credential_type)
84-
parameter:
82+
The LDAP plugin supports traditional 8-character passwords and modern,
83+
longer password phrases through th
84+
[`credential_type`](/vault/api-docs/secret/ldap#credential_type) parameter:
8585

86-
- `password` (Default): The engine will generate and manage standard RACF passwords.
86+
- `password` (Default): Configure the plugin to generate and manage standard RACF passwords.
87+
- `phrase`: Configure the plugin to generate and manage case-sensitive password phrases.
8788

88-
- `phrase`: The engine will generate and manage case-sensitive password phrases.
8989

90-
#### Configuring Password Rules
90+
#### Configure password rules
9191

92-
The complexity rules for generated credentials, such as length, are not
93-
controlled by the RACF schema itself. Instead, you must define and link a
94-
standard Vault [password policy](/vault/docs/concepts/password-policies).
95-
This allows you to enforce site-specific complexity requirements.
92+
The RACF schema does not control the credential complexity rules directly.
93+
To enforce site-specific complexity requirements, define and link a
94+
standard Vault [password policy](/vault/docs/concepts/password-policies)
95+
to your RACF schema.
9696

97-
#### Example Configuration
97+
98+
#### Example configuration
9899

99100
The following example configures the LDAP engine for RACF, sets it to manage
100101
password phrases, and links a password policy to enforce length and

content/vault/v1.20.x/content/docs/secrets/ldap.mdx

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -73,28 +73,29 @@ There are many object classes that provide `userPassword` including for example:
7373

7474
### Resource access control facility (RACF)
7575

76-
To manage credentials for IBM's Resource Access Control Facility (RACF), you
77-
must configure the LDAP secrets engine with the `racf` schema. This enables
78-
specific behaviors required for RACF compatibility.
76+
To manage credentials for an IBM Resource Access Control Facility (RACF),
77+
configure the LDAP secrets engine with the `racf` schema to enable the
78+
behaviors required for RACF compatibility.
7979

80-
#### Credential Type: Password vs. Password Phrase
80+
#### Password vs. password phrase credentials
8181

82-
The engine can manage both traditional 8-character passwords and modern, longer
83-
password phrases. This is controlled by the [`credential_type`](/vault/api-docs/secret/ldap#credential_type)
84-
parameter:
82+
The LDAP plugin supports traditional 8-character passwords and modern,
83+
longer password phrases through th
84+
[`credential_type`](/vault/api-docs/secret/ldap#credential_type) parameter:
8585

86-
- `password` (Default): The engine will generate and manage standard RACF passwords.
86+
- `password` (Default): Configure the plugin to generate and manage standard RACF passwords.
87+
- `phrase`: Configure the plugin to generate and manage case-sensitive password phrases.
8788

88-
- `phrase`: The engine will generate and manage case-sensitive password phrases.
8989

90-
#### Configuring Password Rules
90+
#### Configure password rules
9191

92-
The complexity rules for generated credentials, such as length, are not
93-
controlled by the RACF schema itself. Instead, you must define and link a
94-
standard Vault [password policy](/vault/docs/concepts/password-policies).
95-
This allows you to enforce site-specific complexity requirements.
92+
The RACF schema does not control the credential complexity rules directly.
93+
To enforce site-specific complexity requirements, define and link a
94+
standard Vault [password policy](/vault/docs/concepts/password-policies)
95+
to your RACF schema.
9696

97-
#### Example Configuration
97+
98+
#### Example configuration
9899

99100
The following example configures the LDAP engine for RACF, sets it to manage
100101
password phrases, and links a password policy to enforce length and

content/vault/v1.21.x (rc)/content/docs/secrets/ldap.mdx

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -73,28 +73,29 @@ There are many object classes that provide `userPassword` including for example:
7373

7474
### Resource access control facility (RACF)
7575

76-
To manage credentials for IBM's Resource Access Control Facility (RACF), you
77-
must configure the LDAP secrets engine with the `racf` schema. This enables
78-
specific behaviors required for RACF compatibility.
76+
To manage credentials for an IBM Resource Access Control Facility (RACF),
77+
configure the LDAP secrets engine with the `racf` schema to enable the
78+
behaviors required for RACF compatibility.
7979

80-
#### Credential Type: Password vs. Password Phrase
80+
#### Password vs. password phrase credentials
8181

82-
The engine can manage both traditional 8-character passwords and modern, longer
83-
password phrases. This is controlled by the [`credential_type`](/vault/api-docs/secret/ldap#credential_type)
84-
parameter:
82+
The LDAP plugin supports traditional 8-character passwords and modern,
83+
longer password phrases through th
84+
[`credential_type`](/vault/api-docs/secret/ldap#credential_type) parameter:
8585

86-
- `password` (Default): The engine will generate and manage standard RACF passwords.
86+
- `password` (Default): Configure the plugin to generate and manage standard RACF passwords.
87+
- `phrase`: Configure the plugin to generate and manage case-sensitive password phrases.
8788

88-
- `phrase`: The engine will generate and manage case-sensitive password phrases.
8989

90-
#### Configuring Password Rules
90+
#### Configure password rules
9191

92-
The complexity rules for generated credentials, such as length, are not
93-
controlled by the RACF schema itself. Instead, you must define and link a
94-
standard Vault [password policy](/vault/docs/concepts/password-policies).
95-
This allows you to enforce site-specific complexity requirements.
92+
The RACF schema does not control the credential complexity rules directly.
93+
To enforce site-specific complexity requirements, define and link a
94+
standard Vault [password policy](/vault/docs/concepts/password-policies)
95+
to your RACF schema.
9696

97-
#### Example Configuration
97+
98+
#### Example configuration
9899

99100
The following example configures the LDAP engine for RACF, sets it to manage
100101
password phrases, and links a password policy to enforce length and

0 commit comments

Comments
 (0)