diff --git a/aspnet/security/data-protection/configuration/default-settings.rst b/aspnet/security/data-protection/configuration/default-settings.rst index 5dc911572d..550b4e3e42 100644 --- a/aspnet/security/data-protection/configuration/default-settings.rst +++ b/aspnet/security/data-protection/configuration/default-settings.rst @@ -21,9 +21,9 @@ The developer is always in full control and can override how and where keys are Key Lifetime ------------ -Keys by default have a 90-day lifetime. When a key expires, the system will automatically generate a new key and set the new key as the active key. As long as retired keys remain on the system you will still be able to decrypt any data protected with them. See the key lifetime section for more information. +Keys by default have a 90-day lifetime. When a key expires, the system will automatically generate a new key and set the new key as the active key. As long as retired keys remain on the system you will still be able to decrypt any data protected with them. See :ref:`key lifetime` for more information. Default Algorithms ------------------ -The default payload protection algorithm used is AES-256-CBC for confidentiality and HMACSHA256 for authenticity. A 512-bit master key, rolled every 90 days, is used to derive the two sub-keys used for these algorithms on a per-payload basis. See the subkey derivation section for more information. \ No newline at end of file +The default payload protection algorithm used is AES-256-CBC for confidentiality and HMACSHA256 for authenticity. A 512-bit master key, rolled every 90 days, is used to derive the two sub-keys used for these algorithms on a per-payload basis. See :ref:`subkey derivation` for more information. \ No newline at end of file