Skip to content

Commit 4ad9bc1

Browse files
authored
Update Secure Network.md
text edits
1 parent 9c5cf05 commit 4ad9bc1

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

examples/Secure Network.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -348,9 +348,9 @@ blockchain insert where policy = !assignment and local = true and master = !mas
348348
```
349349

350350
### Step 11 - Provide the local password
351-
The local password protects sensitive info on each node and is provided whenever the node restarts.
351+
The local password protects sensitive information on each node and is provided whenever the node restarts.
352352
In this demo, each node's private key is stored locally and protected by the local password.
353-
In the example below, the password 123 is assigned to operator 1 and 456 is assigned to operator 2.
353+
In the example below, the password 123 is assigned to operator 1, and 456 is assigned to operator 2.
354354

355355
On CLI(oper.1):
356356
<pre>
@@ -363,13 +363,13 @@ set local password = 456
363363
</pre>
364364

365365
Note:
366-
* If a local password exists, an error is returned if the nodes restarts, and the node is provided with incorrect password.
367-
* If the local password is lost, all the relevant files in the ***keys directory*** needs to be deleted, and the
368-
node needs to be assigned with new keys and a new assignment policy.
366+
* If a local password exists, an error is returned if the node restarts, and the node is provided with an incorrect password.
367+
* If the local password is lost, all the relevant files in the ***keys directory*** need to be deleted, and the
368+
node needs to be assigned new keys and a new assignment policy.
369369

370370
### Step 12 - Save the node's private key
371371
The private key can be stored on the node and protected using the local password.
372-
The following examples stores the private key on each node:
372+
The following examples store the private key on each node:
373373

374374
On CLI(oper.1):
375375
<pre>
@@ -385,7 +385,7 @@ Note: The key is stored in a file called ***auth.id*** in the ***keys directory*
385385

386386
### Step 13 - Enable authentication
387387
Enable, on each node a process to authenticate the senders of messages and determine the relevant authorization.
388-
When a node receives a message, the message is signed by the private key of the sender (the key of tje node or the user sending the message).
388+
When a node receives a message, the message is signed by the private key of the sender (the key of the node or the user sending the message).
389389
The receiving node will first use the public key of the sender to authenticate the sender. Next it will consider the permission
390390
policies to determine that the sender is authorized to the type of message received. Authorization is determined if it
391391
is granted by the root user, or by a user which is in a chain of permitted authorizations that is derived from the root user.

0 commit comments

Comments
 (0)