summaryrefslogtreecommitdiff
path: root/docs/vpn/openvpn.rst
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2019-10-02 22:55:47 +0200
committerGitHub <noreply@github.com>2019-10-02 22:55:47 +0200
commit1a3910c1e7597bbc0a560963097ee2ad0efec76d (patch)
treeb86ab37fd7512899b7e76ff9fdfd1d5713f5dec4 /docs/vpn/openvpn.rst
parent542b5589862fd2b8cbae0668abd677be5a365bc8 (diff)
parentcfcd0f040b3dfd2457fbe7f88c4df3f3c5683249 (diff)
downloadvyos-documentation-1a3910c1e7597bbc0a560963097ee2ad0efec76d.tar.gz
vyos-documentation-1a3910c1e7597bbc0a560963097ee2ad0efec76d.zip
Merge pull request #122 from ramaxlo/typo-fix
Fix typos in pages
Diffstat (limited to 'docs/vpn/openvpn.rst')
-rw-r--r--docs/vpn/openvpn.rst8
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/vpn/openvpn.rst b/docs/vpn/openvpn.rst
index e252d016..7e468c7b 100644
--- a/docs/vpn/openvpn.rst
+++ b/docs/vpn/openvpn.rst
@@ -160,7 +160,7 @@ OpenVPN Server
Multi-client server is the most popular OpenVPN mode on routers. It always uses
x.509 authentication and therefore requires a PKI setup. This guide assumes you
have already setup a PKI and have a CA certificate, a server certificate and
-key, a certificate revokation list, a Diffie-Hellman key exchange parameters
+key, a certificate revocation list, a Diffie-Hellman key exchange parameters
file. You do not need client certificates and keys for the server setup.
In this example we will use the most complicated case: a setup where each
@@ -235,11 +235,11 @@ OpenLDAP
========
Enterprise installations usually ship a kind of directory service which is used
-to have a single password store for all employes. VyOS and OpenVPN support using
+to have a single password store for all employees. VyOS and OpenVPN support using
LDAP/AD as single user backend.
Authentication is done by using the ``openvpn-auth-ldap.so`` plugin which is
-shiped with every VyOS installation. A dedicated configuration file is required.
+shipped with every VyOS installation. A dedicated configuration file is required.
It is best practise to store it in ``/config`` to survive image updates
.. code-block:: sh
@@ -306,7 +306,7 @@ Despite the fact that AD is a superset of LDAP
</Group>
</Authorization>
-If you only wan't to check if the user account is enabled and can authenticate
+If you only want to check if the user account is enabled and can authenticate
(against the primary group) the following snipped is sufficient:
.. code-block:: sh