diff --git a/website/source/docs/connect/ca.html.md b/website/source/docs/connect/ca.html.md index 3cc1e9bb99..b255b8ac13 100644 --- a/website/source/docs/connect/ca.html.md +++ b/website/source/docs/connect/ca.html.md @@ -17,7 +17,7 @@ such as when a service needs a new certificate or during CA rotation events. The CA provider abstraction enables Consul to support multiple systems for storing and signing certificates. Consul ships with a [built-in CA](/docs/connect/ca/consul.html) which generates and stores the -root certificate and private key on the Consul servers. Consul also also +root certificate and private key on the Consul servers. Consul also has built-in support for [Vault as a CA](/docs/connect/ca/vault.html). With Vault, the root certificate and private key material remain with the Vault cluster. A future version of diff --git a/website/source/docs/connect/ca/consul.html.md b/website/source/docs/connect/ca/consul.html.md index 5d7257e1a2..ea48850a94 100644 --- a/website/source/docs/connect/ca/consul.html.md +++ b/website/source/docs/connect/ca/consul.html.md @@ -50,7 +50,8 @@ is used if configuring in an agent configuration file. must be a valid [SPIFFE SVID signing certificate](https://github.com/spiffe/spiffe/blob/master/standards/X509-SVID.md) and the URI in the SAN must match the cluster identifier created at - bootstrap with the ".consul" TLD. + bootstrap with the ".consul" TLD. The cluster identifier can be found + using the [CA List Roots endpoint](/api/connect/ca.html#list-ca-root-certificates). ## Specifying a Custom Private Key and Root Certificate