Skip to content

Commit

Permalink
Change wording for FIPS 140-2 (#34471)
Browse files Browse the repository at this point in the history
Changes wording in the FIPS 140-2 related documentation. 

Co-authored-by: derickson <dave@elastic.co>
  • Loading branch information
2 people authored and kcm committed Oct 30, 2018
1 parent aab80bd commit 6359bf7
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions x-pack/docs/en/security/fips-140-compliance.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ government computer security standard used to approve cryptographic modules.
enabled JVM. In order to set {es} in fips mode, you must set the
`xpack.security.fips_mode.enabled` to `true` in `elasticsearch.yml`

For {es}, FIPS 140-2 compliance is ensured by
For {es}, adherence to FIPS 140-2 is ensured by

- Using FIPS approved / NIST recommended cryptographic algorithms.
- Delegating the implementation of these cryptographic algorithms to a NIST
Expand Down Expand Up @@ -125,4 +125,4 @@ features are not available while running in fips mode. The list is as follows:
* The SQL CLI client cannot run in a FIPS 140-2 enabled JVM while using
TLS for transport security or PKI for client authentication.
* The SAML Realm cannot decrypt and consume encrypted Assertions or encrypted
attributes in Attribute Statements from the SAML IdP.
attributes in Attribute Statements from the SAML IdP.

0 comments on commit 6359bf7

Please sign in to comment.