diff --git a/doc_source/client-authentication.md b/doc_source/client-authentication.md index d80ce5e..e800055 100644 --- a/doc_source/client-authentication.md +++ b/doc_source/client-authentication.md @@ -93,11 +93,11 @@ The following procedure uses OpenVPN easy\-rsa to generate the server and client 1. Upload the server certificate and key and the client certificate and key to ACM\. The following commands use the AWS CLI\. ``` - $ aws acm import-certificate --certificate file://server.crt --private-key file://server.key --certificate-chain file://ca.crt --region region + $ aws acm import-certificate --certificate fileb://server.crt --private-key fileb://server.key --certificate-chain fileb://ca.crt --region region ``` ``` - $ aws acm import-certificate --certificate file://client1.domain.tld.crt --private-key file://client1.domain.tld.key --certificate-chain file://ca.crt --region region + $ aws acm import-certificate --certificate fileb://client1.domain.tld.crt --private-key fileb://client1.domain.tld.key --certificate-chain fileb://ca.crt --region region ``` To upload the certificates using the ACM console, see [Import a Certificate](https://docs.aws.amazon.com/acm/latest/userguide/import-certificate-api-cli.html) in the *AWS Certificate Manager User Guide*\. @@ -169,4 +169,4 @@ The following table lists the SAML\-based IdPs that we have tested for use with | IdP | Resource | | --- | --- | -| Okta | [Authenticate AWS Client VPN users with SAML](https://aws.amazon.com/blogs/networking-and-content-delivery/authenticate-aws-client-vpn-users-with-saml/)\. | \ No newline at end of file +| Okta | [Authenticate AWS Client VPN users with SAML](https://aws.amazon.com/blogs/networking-and-content-delivery/authenticate-aws-client-vpn-users-with-saml/)\. |