From 086d1e977d675390dabaaa1f9b59fe37b74ca3de Mon Sep 17 00:00:00 2001 From: Olga Tikhomirova <85509260+missmesss@users.noreply.github.com> Date: Wed, 20 Sep 2023 22:12:13 -0700 Subject: [PATCH] adding attribute --- docs/modules/ROOT/pages/support/data-privacy.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/modules/ROOT/pages/support/data-privacy.adoc b/docs/modules/ROOT/pages/support/data-privacy.adoc index f16b8ebc..ea4d949e 100644 --- a/docs/modules/ROOT/pages/support/data-privacy.adoc +++ b/docs/modules/ROOT/pages/support/data-privacy.adoc @@ -20,6 +20,6 @@ When you create an application, {ProductName} stores the link to your GitHub rep With {ProductName}, you can use build and deployment secrets to secure your environments and store sensitive data such as your credentials, API and encryption keys, access tokens, and more. We store secrets using AWS Secrets Manager. -*Note:* Use secrets to store sensitive data. Do not enter any sensitive data in environment variables because App Studio stores such variables in a public GitOps repository. To create secrets, see link:https://redhat-appstudio.github.io/docs.appstudio.io/Documentation/main/how-to-guides/configuring-builds/proc_creating-secrets-for-your-builds[Creating secrets for your builds]. +*Note:* Use secrets to store sensitive data. Do not enter any sensitive data in environment variables because {ProductName} stores such variables in a public GitOps repository. To create secrets, see link:https://redhat-appstudio.github.io/docs.appstudio.io/Documentation/main/how-to-guides/configuring-builds/proc_creating-secrets-for-your-builds[Creating secrets for your builds]. // TODO add more secrets links when published \ No newline at end of file