diff options
author | Sol Jerome <sol.jerome@gmail.com> | 2013-09-18 17:48:28 -0500 |
---|---|---|
committer | Sol Jerome <sol.jerome@gmail.com> | 2013-09-18 17:48:28 -0500 |
commit | 2968bef7e96c17b11cf1b6251dd2e44cf45a50cf (patch) | |
tree | b86e82a5667fe8a1859e11ddb89db3de72a4073c | |
parent | 72af54a6af562b7f739f9c994be486e33c65dfc6 (diff) | |
download | bcfg2-2968bef7e96c17b11cf1b6251dd2e44cf45a50cf.tar.gz bcfg2-2968bef7e96c17b11cf1b6251dd2e44cf45a50cf.tar.bz2 bcfg2-2968bef7e96c17b11cf1b6251dd2e44cf45a50cf.zip |
doc: Fix broken links
Signed-off-by: Sol Jerome <sol.jerome@gmail.com>
-rw-r--r-- | doc/server/acl.txt | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/doc/server/acl.txt b/doc/server/acl.txt index 6ea276a53..3cb9d59a1 100644 --- a/doc/server/acl.txt +++ b/doc/server/acl.txt @@ -14,7 +14,7 @@ configuration) while others can be used to inspect potentially private data on the server or very easily mount a denial of service attack. As a result, access control lists to limit exposure of these calls is built in. There are two possible ACL methods: built-in, and the -:ref:`server-plugins-misc-acls` plugin. +:ref:`server-plugins-misc-acl` plugin. The built-in approach simply applies a restrictive default ACL that lets ``localhost`` perform all XML-RPC calls, and restricts all other @@ -38,4 +38,4 @@ Specifically: The built-in ACL is *only* intended to ensure that Bcfg2 is secure by default; it will not be sufficient in many (or even most) cases. In these cases, it's recommended that you use the -:ref:`server-plugins-misc-acls` plugin. +:ref:`server-plugins-misc-acl` plugin. |