Skip to content

Commit 54658f3

Browse files
author
Chris Cho
authored
DOCSP-12574: update use cases nav item n ame (#677)
* DOCSP-12574: update use cases nav item name
1 parent d506ed3 commit 54658f3

File tree

5 files changed

+19
-19
lines changed

5 files changed

+19
-19
lines changed

source/index.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ MongoDB Drivers
2727
Swift Driver </swift>
2828
Rust Driver </rust>
2929
About Compatibility Tables <about-compatibility>
30-
/use-cases
30+
Security </security>

source/security.txt

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
========
2+
Security
3+
========
4+
5+
.. default-domain:: mongodb
6+
7+
8+
- :doc:`/security/client-side-field-level-encryption-guide`
9+
- :doc:`/security/client-side-field-level-encryption-local-key-to-kms`
10+
11+
.. toctree::
12+
:titlesonly:
13+
14+
/security/client-side-field-level-encryption-guide.txt
15+
/security/client-side-field-level-encryption-local-key-to-kms.txt

source/use-cases/client-side-field-level-encryption-guide.txt renamed to source/security/client-side-field-level-encryption-guide.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ the same MongoDB replica set as the encrypted data.
288288

289289
To learn how to use a KMS in your CSFLE implementation, read the
290290
:doc:`Client-Side Field Level Encryption: Use a KMS to Store the Master Key
291-
</use-cases/client-side-field-level-encryption-local-key-to-kms/>`
291+
</security/client-side-field-level-encryption-local-key-to-kms/>`
292292
guide.
293293

294294
To begin development, MedcoMD engineers generate a master key and save it
@@ -1052,7 +1052,7 @@ secure storage location such as a Key Management System (KMS).
10521052

10531053
For more information on securing your master key, see our :doc:`step-by-step
10541054
guide to integrating with Amazon KMS
1055-
</use-cases/client-side-field-level-encryption-local-key-to-kms/>`.
1055+
</security/client-side-field-level-encryption-local-key-to-kms/>`.
10561056

10571057
Further Reading
10581058
~~~~~~~~~~~~~~~

source/use-cases/client-side-field-level-encryption-local-key-to-kms.txt renamed to source/security/client-side-field-level-encryption-local-key-to-kms.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ AWS KMS.
2525

2626
For a detailed walkthrough on developing and configuring a CSFLE client
2727
with an example use case, see our `CSFLE guide
28-
</use-cases/client-side-field-level-encryption-guide>`_.
28+
</security/client-side-field-level-encryption-guide>`_.
2929

3030
Reasons to Use a KMS
3131
--------------------

source/use-cases.txt

Lines changed: 0 additions & 15 deletions
This file was deleted.

0 commit comments

Comments
 (0)