Skip to content

Commit

Permalink
update vocab
Browse files Browse the repository at this point in the history
  • Loading branch information
m1ghtym0 committed Aug 7, 2023
1 parent abed7f2 commit 19b3e00
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 1 deletion.
2 changes: 1 addition & 1 deletion docs/docs/architecture/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ The *Root CA Certificate* has no expiry date and lives as long as the MarbleRun

Alongside the *Root CA Certificate*, the Coordinator generates an x509 *Intermediate Certificate* and corresponding asymmetric key pair, again using ECDSA with P256.
The *Intermediate Certificate* is signed by the Coordinator's *Root CA Certificate* and rotated with every manifest update.
When you push an update to the manifest (for example, bump up the *SecurityVersion* of a Mable), the *Intermediate_ Certificate* will change.
When you push an update to the manifest (for example, bump up the *SecurityVersion* of a Mable), the *Intermediate Certificate* will change.
Instances with the new version won't authenticate with instances of the old version and vice versa.
Hence, no data flow is happening between different *SecurityVersions* of your application.
However, the *Root CA Certificate* doesn't change. So you can still verify the Coordinator and your application from the outside and ensure it's the same instance you might have interacted with.
Expand Down
2 changes: 2 additions & 0 deletions docs/styles/Vocab/edgeless/accept.txt
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ config
Dockerfile
emojivoto
Env
Equinix
[Gg]ramine
hardcode
helloworld
Expand All @@ -32,5 +33,6 @@ Tensorflow
toleration
toolchain
updatable
VM
walkthrough
Xeon

0 comments on commit 19b3e00

Please sign in to comment.