Update the documentation pages

This commit is contained in:
OpenIddict Bot
2022-03-07 15:21:34 +00:00
parent 93262307b5
commit 2705db2e33
63 changed files with 126 additions and 126 deletions

View File

@@ -162,7 +162,7 @@ request.CertificateExtensions.Add(new X509KeyUsageExtension(X509KeyUsageFlags.Ke
var certificate = request.CreateSelfSigned(DateTimeOffset.UtcNow, DateTimeOffset.UtcNow.AddYears(2));
var data = certificate.Export(X509ContentType.Pfx, string.Empty);
File.WriteAllBytes("encryption-certificate.pfx", certificate.Export(X509ContentType.Pfx, string.Empty));
</code></pre><pre><code class="lang-csharp">using var algorithm = RSA.Create(keySizeInBits: 2048);
var subject = new X500DistinguishedName(&quot;CN=Fabrikam Signing Certificate&quot;);
@@ -171,10 +171,10 @@ request.CertificateExtensions.Add(new X509KeyUsageExtension(X509KeyUsageFlags.Di
var certificate = request.CreateSelfSigned(DateTimeOffset.UtcNow, DateTimeOffset.UtcNow.AddYears(2));
var data = certificate.Export(X509ContentType.Pfx, string.Empty);
File.WriteAllBytes(&quot;signing-certificate.pfx&quot;, certificate.Export(X509ContentType.Pfx, string.Empty));
</code></pre><p>The best place to store your certificates will depend on your host:</p>
<ul>
<li>For IIS applications, storing the certificates in the machine store is the recommended option.</li>
<li>For IIS applications, <a href="https://www.sonicwall.com/support/knowledge-base/how-can-i-import-certificates-into-the-ms-windows-local-machine-certificate-store/170504615105398/">storing the certificates in the machine store</a> is the recommended option.</li>
<li>On Azure, certificates can be uploaded and exposed to Azure App Services applications using the special <code>WEBSITE_LOAD_CERTIFICATES</code> flag.
For more information, visit <a href="https://docs.microsoft.com/en-us/azure/app-service/configure-ssl-certificate-in-code">Use a TLS/SSL certificate in your code in Azure App Service</a>.</li>
</ul>