Fix NOTE (#22062)
parent
e8389375a7
commit
3f48af1d51
|
@ -416,7 +416,7 @@ Adding a `Strict-Transport-Security` (HSTS) header ensures all subsequent reques
|
|||
>
|
||||
> Apache HTTP Server version 2.4.43 or newer is required in order to operate a TLS 1.3 web server with OpenSSL 1.1.1.
|
||||
|
||||
> [NOTE]
|
||||
> [!NOTE]
|
||||
> The preceding example disables Online Certificate Status Protocol (OCSP) Stapling. For more information and guidance on enabling OCSP, see [OCSP Stapling (Apache documentation)](https://httpd.apache.org/docs/trunk/ssl/ssl_howto.html#ocspstapling).
|
||||
|
||||
Save the file and test the configuration:
|
||||
|
|
|
@ -417,7 +417,7 @@ Add the */etc/nginx/proxy.conf* configuration file:
|
|||
> [!NOTE]
|
||||
> Blazor WebAssembly apps require a larger `burst` parameter value to accommodate the larger number of requests made by an app. For more information, see <xref:blazor/host-and-deploy/webassembly#nginx>.
|
||||
|
||||
> [NOTE]
|
||||
> [!NOTE]
|
||||
> The preceding example disables Online Certificate Status Protocol (OCSP) Stapling. If enabled, confirm that the certificate supports the feature. For more information and guidance on enabling OCSP, see the following properties in the [Module ngx_http_ssl_module (Nginx documentation)](http://nginx.org/en/docs/http/ngx_http_ssl_module.html) article:
|
||||
>
|
||||
> * `ssl_stapling`
|
||||
|
|
Loading…
Reference in New Issue