# HG changeset patch # User RhodeCode Admin # Date 2024-08-20 14:16:01 # Node ID b08d803aabe810c61738065f05c85bf0315a5dc1 # Parent 3fc95e3b207f94e888db8db1949a3e6aa31fa545 fix(docs): fixed rst error diff --git a/docs/auth/auth-saml-azure.rst b/docs/auth/auth-saml-azure.rst --- a/docs/auth/auth-saml-azure.rst +++ b/docs/auth/auth-saml-azure.rst @@ -109,13 +109,15 @@ Service Provider Cert Dir .. note:: Optional directory to store service provider certificate and private keys. Expected certs for the SP should be stored in this folder as: - * sp.key Private Key - * sp.crt Public cert - * sp_new.crt Future Public cert + + * sp.key Private Key + * sp.crt Public cert + * sp_new.crt Future Public cert Also you can use other cert to sign the metadata of the SP using the: - * metadata.key - * metadata.crt + + * metadata.key + * metadata.crt Expected NameID Format `nameid-format:emailAddress`: diff --git a/docs/auth/auth-saml-duosecurity.rst b/docs/auth/auth-saml-duosecurity.rst --- a/docs/auth/auth-saml-duosecurity.rst +++ b/docs/auth/auth-saml-duosecurity.rst @@ -109,13 +109,15 @@ Service Provider Cert Dir .. note:: Optional directory to store service provider certificate and private keys. Expected certs for the SP should be stored in this folder as: - * sp.key Private Key - * sp.crt Public cert - * sp_new.crt Future Public cert + + * sp.key Private Key + * sp.crt Public cert + * sp_new.crt Future Public cert Also you can use other cert to sign the metadata of the SP using the: - * metadata.key - * metadata.crt + + * metadata.key + * metadata.crt Expected NameID Format `nameid-format:emailAddress`: diff --git a/docs/auth/auth-saml-onelogin.rst b/docs/auth/auth-saml-onelogin.rst --- a/docs/auth/auth-saml-onelogin.rst +++ b/docs/auth/auth-saml-onelogin.rst @@ -109,13 +109,15 @@ Service Provider Cert Dir .. note:: Optional directory to store service provider certificate and private keys. Expected certs for the SP should be stored in this folder as: - * sp.key Private Key - * sp.crt Public cert - * sp_new.crt Future Public cert + + * sp.key Private Key + * sp.crt Public cert + * sp_new.crt Future Public cert Also you can use other cert to sign the metadata of the SP using the: - * metadata.key - * metadata.crt + + * metadata.key + * metadata.crt Expected NameID Format `nameid-format:emailAddress`: