Skip to content

Commit 3eab0d4

Browse files
committed
Fixed broken links
1 parent 4ddc3b7 commit 3eab0d4

3 files changed

Lines changed: 5 additions & 5 deletions

File tree

api-management/access-control/sessions-and-keys/understanding-sessions.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ When a request arrives, Tyk retrieves the Session and evaluates its fields to de
2424

2525
## Configuration Options
2626

27-
A Session contains several categories of configuration options. While you can configure these directly on individual sessions, it is highly recommended to manage them via [**Policies**](/access-control/policies/understanding-policies).
27+
A Session contains several categories of configuration options. While you can configure these directly on individual sessions, it is highly recommended to manage them via [**Policies**](/api-management/access-control/policies/understanding-policies).
2828

2929
### Access Control
3030

@@ -121,6 +121,6 @@ Instead of configuring access rights and limits directly on the session, you can
121121

122122
## Next Steps
123123

124-
- Learn how to manage the [Session Lifecycle](/access-control/sessions-and-keys/session-lifecycle) to control how long a key will be valid.
125-
- Discover how to use [Policies](/access-control/policies/understanding-policies) to manage Sessions at scale.
124+
- Learn how to manage the [Session Lifecycle](/api-management/access-control/sessions-and-keys/session-lifecycle) to control how long a key will be valid.
125+
- Discover how to use [Policies](/api-management/access-control/policies/understanding-policies) to manage Sessions at scale.
126126
```

api-management/authentication/certificate-auth.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ When a client makes a request:
3737
3. If the client is successfully authenticated, Tyk checks the client certificate against a list of authorized certificates (the "dynamic allow list")
3838
4. If a match is found, authorization proceeds as usual, based on the content of the linked session and any policies applied to it
3939

40-
Each client certificate must be [pre-registered](/api-management/authentication/certificate-auth#registering-certificate-authentication-user-credentials) with the [Tyk Certificate Store](/api-management/certificates#tyk-certificate-store) and a [Session](/access-control/sessions-and-keys/understanding-sessions) created for each in the temporal storage (Redis) to create the dynamic allow list. This list is dynamic because certificate-linked session objects (and hence clients) can be added to or removed from the list without making any change to the API definition. This is in contrast to the [static allow list](/api-management/implement-tls#using-a-static-client-certificate-allow-list) approach where the list of authorized certificates is stored in the API definition.
40+
Each client certificate must be [pre-registered](/api-management/authentication/certificate-auth#registering-certificate-authentication-user-credentials) with the [Tyk Certificate Store](/api-management/certificates#tyk-certificate-store) and a [Session](/api-management/access-control/sessions-and-keys/understanding-sessions) created for each in the temporal storage (Redis) to create the dynamic allow list. This list is dynamic because certificate-linked session objects (and hence clients) can be added to or removed from the list without making any change to the API definition. This is in contrast to the [static allow list](/api-management/implement-tls#using-a-static-client-certificate-allow-list) approach where the list of authorized certificates is stored in the API definition.
4141

4242

4343
## Configuring your API to use Certificate Authentication

api-management/authentication/jwt-authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ When a request with a JWT arrives at Tyk Gateway, after the authentication (sign
3434
- From scope-to-policy mapping
3535
- From default policies
3636

37-
3. **Update Session**: The [Session](/access-control/sessions-and-keys/understanding-sessions) is updated with the identity and policies.
37+
3. **Update Session**: The [Session](/api-management/access-control/sessions-and-keys/understanding-sessions) is updated with the identity and policies.
3838

3939
In the following sections, we provide a detailed explanation of each of these steps.
4040

0 commit comments

Comments
 (0)