Skip to content

Commit cc56eb4

Browse files
authored
Maintenance: Adjust wording for Let's Encrypt and fix Certbot link
1 parent b0dde51 commit cc56eb4

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

getting-started/configure-webserver.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ directory and make sure to replace ``server_name localhost;`` (Nginx) or
5151
You either already know what you're doing, you're developing or like the
5252
danger. ⚔️
5353

54-
.. tab:: letsencrypt
54+
.. tab:: Let's Encrypt
5555

56-
letsencrypt is an easy and free way to retrieve valid ssl certificates.
56+
Let's Encrypt is an easy and free way to retrieve valid ssl certificates.
5757
These certificates are valid for 90 days and can be renewed automatically.
5858

5959
The two most common tools are
@@ -87,14 +87,14 @@ directory and make sure to replace ``server_name localhost;`` (Nginx) or
8787

8888
.. hint:: **Not exactly what you're looking for?**
8989

90-
The `cerbot documentation`_
90+
The `Certbot documentation`_
9191
has a lot more use cases than we cover here.
9292

9393
.. tab:: acme.sh
9494

9595
.. note::
9696

97-
acme.sh by default no longer uses letsencrypt.
97+
acme.sh by default no longer uses Let's Encrypt.
9898
For this reason you'll have to change the default CA.
9999

100100
.. code-block:: console
@@ -150,7 +150,7 @@ directory and make sure to replace ``server_name localhost;`` (Nginx) or
150150
.. tab:: public, paid CA
151151

152152
If you prefer to use certificates from other official CAs than
153-
letsencrypt, you can do so as well. Just get your certificate bundle from
153+
Let's Encrypt, you can do so as well. Just get your certificate bundle from
154154
the source you prefer and continue with
155155
`Adjusting the webserver configuration`_.
156156

@@ -202,7 +202,7 @@ directory and make sure to replace ``server_name localhost;`` (Nginx) or
202202
If above command is not good enough for you, the
203203
`openSSL documentation`_ is a good place to learn more.
204204

205-
.. _cerbot documentation: https://certbot.eff.org/docs/using.html#certbot-commands
205+
.. _Certbot documentation: https://certbot.eff.org/docs/using.html#certbot-commands
206206
.. _acme.sh documentation: https://github.com/acmesh-official/acme.sh/wiki/How-to-issue-a-cert
207207
.. _Sectigo (formerly Comodo): https://sectigo.com/ssl-certificates-tls
208208
.. _Secorio: https://secorio.com/en/productfinder/

install/docker-compose.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ To publish a Zammad stack on the internet, it needs be secured via the HTTPS
111111
protocol. To achieve that without modifying the Zammad stack, you can:
112112

113113
- Use a reverse proxy like Nginx Proxy Manager (NPM). It has a GUI that provides
114-
an easy `Letsencrypt <https://letsencrypt.org/>`_ integration.
114+
an easy `Let's Encrypt <https://letsencrypt.org/>`_ integration.
115115
- Use a cloudflare tunnel, which provides SSL termination.
116116

117117
Both scenarios are covered in the

0 commit comments

Comments
 (0)