Commit 32593ab2 authored by Evan Read's avatar Evan Read

Merge branch 'dev.shubham.net-master-patch-83936' into 'master'

Fixed docs warnings detected by the vale Acronym rule

See merge request gitlab-org/gitlab!76048
parents 0979cf1b 1a6c3713
...@@ -84,7 +84,7 @@ in a safe place. ...@@ -84,7 +84,7 @@ in a safe place.
> - It's deployed behind a feature flag, disabled by default. > - It's deployed behind a feature flag, disabled by default.
> - To use it in GitLab self-managed instances, ask a GitLab administrator to [enable it](#enable-fortiauthenticator-integration). > - To use it in GitLab self-managed instances, ask a GitLab administrator to [enable it](#enable-fortiauthenticator-integration).
You can use FortiAuthenticator as an OTP provider in GitLab. Users must exist in You can use FortiAuthenticator as a one-time password (OTP) provider in GitLab. Users must exist in
both FortiAuthenticator and GitLab with the exact same username, and users must both FortiAuthenticator and GitLab with the exact same username, and users must
have FortiToken configured in FortiAuthenticator. have FortiToken configured in FortiAuthenticator.
...@@ -163,7 +163,7 @@ Feature.enable(:forti_authenticator, User.find(<user ID>)) ...@@ -163,7 +163,7 @@ Feature.enable(:forti_authenticator, User.find(<user ID>))
WARNING: WARNING:
This feature might not be available to you. Check the **version history** note above for details. This feature might not be available to you. Check the **version history** note above for details.
You can use FortiToken Cloud as an OTP provider in GitLab. Users must exist in You can use FortiToken Cloud as a one-time password (OTP) provider in GitLab. Users must exist in
both FortiToken Cloud and GitLab with the exact same username, and users must both FortiToken Cloud and GitLab with the exact same username, and users must
have FortiToken configured in FortiToken Cloud. have FortiToken configured in FortiToken Cloud.
...@@ -478,7 +478,7 @@ request a GitLab global administrator disable two-factor authentication for your ...@@ -478,7 +478,7 @@ request a GitLab global administrator disable two-factor authentication for your
- You need to take special care to that 2FA keeps working after - You need to take special care to that 2FA keeps working after
[restoring a GitLab backup](../../../raketasks/backup_restore.md). [restoring a GitLab backup](../../../raketasks/backup_restore.md).
- To ensure 2FA authorizes correctly with TOTP server, you may want to ensure - To ensure 2FA authorizes correctly with time-based one time passwords (TOTP) server, you may want to ensure
your GitLab server's time is synchronized via a service like NTP. Otherwise, your GitLab server's time is synchronized via a service like NTP. Otherwise,
you may have cases where authorization always fails because of time differences. you may have cases where authorization always fails because of time differences.
- The GitLab U2F implementation does _not_ work when the GitLab instance is accessed from - The GitLab U2F implementation does _not_ work when the GitLab instance is accessed from
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment