From adc48727d866516e23dce2e44016552b29d2ede1 Mon Sep 17 00:00:00 2001 From: Daniel Roth Date: Tue, 16 Feb 2016 15:05:45 -0800 Subject: [PATCH] Use gender neutral language Addresses https://github.com/aspnet/Docs/issues/745 --- .../data-protection/implementation/key-encryption-at-rest.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/aspnet/security/data-protection/implementation/key-encryption-at-rest.rst b/aspnet/security/data-protection/implementation/key-encryption-at-rest.rst index 930916ffc1..ef3d2fbaee 100644 --- a/aspnet/security/data-protection/implementation/key-encryption-at-rest.rst +++ b/aspnet/security/data-protection/implementation/key-encryption-at-rest.rst @@ -84,7 +84,7 @@ There is also a parameterless overload of ProtectKeysWithDpapiNG. This is a conv configure.ProtectKeysWithDpapiNG(); }); -In this scenario, the AD domain controller is responsible for distributing the encryption keys used by the DPAPI-NG operations. The target user will be able to decipher the encrypted payload from any domain-joined machine (provided that the process is running under his identity). +In this scenario, the AD domain controller is responsible for distributing the encryption keys used by the DPAPI-NG operations. The target user will be able to decipher the encrypted payload from any domain-joined machine (provided that the process is running under their identity). Certificate-based encryption with Windows DPAPI-NG -------------------------------------------------- @@ -105,4 +105,4 @@ Any application which is pointed at this repository must be running on Windows 8 Custom key encryption --------------------- -If the in-box mechanisms are not appropriate, the developer can specify his own key encryption mechanism by providing a custom IXmlEncryptor. \ No newline at end of file +If the in-box mechanisms are not appropriate, the developer can specify their own key encryption mechanism by providing a custom IXmlEncryptor.