diff --git a/advocacy_docs/partner_docs/ThalesCipherTrustManager/04-ConfiguringThalesCipherTrustManager.mdx b/advocacy_docs/partner_docs/ThalesCipherTrustManager/04-ConfiguringThalesCipherTrustManager.mdx index d79c5500f27..e2c94eb02a4 100644 --- a/advocacy_docs/partner_docs/ThalesCipherTrustManager/04-ConfiguringThalesCipherTrustManager.mdx +++ b/advocacy_docs/partner_docs/ThalesCipherTrustManager/04-ConfiguringThalesCipherTrustManager.mdx @@ -96,7 +96,7 @@ Complete! ## Configure Thales CipherTrust Manager for your EDB Postgres distribution -After Thales CipherTrust Manger is up and running, create the required certificates. +After Thales CipherTrust Manager is up and running, create the required certificates. ## Log in to Thales CipherTrust Manager and create user When creating a key on Thales CipherTrust Manager with an EDB Postgres distribution, you need to create a user for future authentication. This process verifies the username and password against the Thales CipherTrust Manager internal database. @@ -178,4 +178,4 @@ These are the other two certificates you need for your KMIP server and `pykmip.c 10. To download the final two certificates, select **Save Private Key**, and then select **Save Certificate**. Make sure to note their downloaded location for later. ![Thales Download Certificate Files](Images/ThalesDownloadCerts.png) -You are now ready to use Thales CipherTrust Manager and your EDB Postgres distribution with TDE for key management. \ No newline at end of file +You are now ready to use Thales CipherTrust Manager and your EDB Postgres distribution with TDE for key management.