Skip to content

Commit

Permalink
GITBOOK-1352: change request with no subject merged in GitBook
Browse files Browse the repository at this point in the history
  • Loading branch information
mrinalwadhwa authored and gitbook-bot committed Feb 18, 2024
1 parent 715296d commit 719c1fb
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ psql --host localhost --port 15432

Similarly, using another simple command a kafka producer can publish end-to-end encrypted messages for a specific kafka consumer. Kafka brokers in the middle can’t see, manipulate, or accidentally leak sensitive enterprise data. This minimizes risk to sensitive business data and makes it easy to comply with data governance policies.

## Portals
## Encrypted Portals <a href="#portals" id="portals"></a>

Portals carry various application protocols over end-to-end encrypted Ockam secure channels.

Expand Down
4 changes: 2 additions & 2 deletions how-does-ockam-work.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,9 @@ To understand how these protocols work together, let’s create an encrypted [po

## Sign up, Install and Enroll

The first step is to [<mark style="color:blue;">Sign up for Ockam</mark>](https://www.ockam.io/download), that process will guide you through installing Ockam Command and enrolling your identity with Ockam Orchestrator. The commands below can be run in a production setup with two machines in two different networks or in a dev environment on a single machine. If you’re doing this on two machines, install and enroll on both machines.
The first step is to [<mark style="color:blue;">Sign up for Ockam</mark>](https://www.ockam.io/download), that process will guide you through installing Ockam Command and enrolling your identity with Ockam Orchestrator.

The enroll command creates a new [<mark style="color:blue;">vault</mark>](reference/protocols/keys.md) and generates a cryptographic [<mark style="color:blue;">identity</mark>](reference/protocols/identities.md) with private keys stored in that vault. It then guides you to sign in to Ockam Orchestrator.
The enroll command creates a new [<mark style="color:blue;">vault</mark>](reference/protocols/keys.md) and generates a cryptographic [<mark style="color:blue;">identity</mark>](reference/protocols/identities.md) with private keys stored in that vault. It then guides you to sign in to Ockam Orchestrator. The commands below can be run in a production setup with two machines in two different networks or in a dev environment on a single machine. If you’re doing this on two machines, install and enroll on both machines.

If this is your first time signing in, the Orchestrator creates a new dedicated project for you. A project offers two services: a membership [<mark style="color:blue;">authority</mark>](reference/protocols/identities.md#credentials) and a [<mark style="color:blue;">relay</mark>](reference/protocols/routing.md#relay) service.

Expand Down

0 comments on commit 719c1fb

Please sign in to comment.