Skip to content

Commit

Permalink
Merge pull request #396 from IwonaLanger/fix_broken_links
Browse files Browse the repository at this point in the history
Fix broken links
  • Loading branch information
kyma-bot authored Dec 5, 2024
2 parents 12c6ef6 + 0b5db94 commit c226503
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion components/central-application-gateway/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ Central Application Gateway exposes:
- 2 internal APIs implementing a proxy handler accessible via a service of type `ClusterIP`
- an endpoint for changing the log level

Application Gateway also supports redirects for the request flows in which the URL host remains unchanged. For more details, see [Response rewriting](https://kyma-project.io/#/application-connector-manager/user/technical-reference/07-10-application-gateway-details?id=response-rewriting).
Application Gateway also supports redirects for the request flows in which the URL host remains unchanged. For more details, see [Response Rewriting](https://kyma-project.io/#/application-connector-manager/user/technical-reference/02-20-application-gateway?id=response-rewriting).

### Standalone Mode

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Disable TLS Certificate Verification

You can disable the [TLS certificate verification](../00-20-security.md#tls-certificate-verification-for-external-systems) for the connections between Kyma and an external solution represented by an Application. This allows Kyma to send requests and data to an unsecured Application without verifying its presented TLS certificate. Disabling the certificate verification can be useful in certain testing scenarios.
You can disable the TLS certificate verification for the connections between Kyma and an external solution represented by an Application. This allows Kyma to send requests and data to an unsecured Application without verifying its presented TLS certificate. Disabling the certificate verification can be useful in certain testing scenarios.

> [!NOTE]
> By default, the TLS certificate verification is enabled when sending data and requests to every Application.
Expand Down

0 comments on commit c226503

Please sign in to comment.