diff --git a/docs/solo/fido2-impl.md b/docs/solo/fido2-impl.md index 4747516..d0d5890 100644 --- a/docs/solo/fido2-impl.md +++ b/docs/solo/fido2-impl.md @@ -21,7 +21,7 @@ When you register a service with a FIDO2 or U2F authenticator, the authenticator must generate a new keypair unique to that service. This keypair could be stored on the authenticator to be used in subsequent authentications, but now a certain amount of memory needs to be allocated for this. On embedded -devices, there isn't much memory to spare and users will allows frustratingly +devices, there isn't much memory to spare and users will always frustratingly hit the limit of this memory. The answer to this problem is to do key wrapping. The authenticator just diff --git a/mkdocs.yml b/mkdocs.yml index 60b1618..2d69cbc 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -1,21 +1,21 @@ -site_name: Solo +site_name: Solo Technical Documentation site_author: SoloKeys site_description: 'Documentation for the SoloKeys solo software' site_url: 'https://docs.solokeys.io/solo/' repo_url: 'https://github.com/solokeys/solo' repo_name: 'solokeys/solo' -copyright: 'Copyright © 2018-2019 SoloKeys' +copyright: 'Copyright © 2018 - 2019 SoloKeys' nav: - Home: solo/index.md - - README.md: solo/repo-readme.md - FIDO2 Implementation: solo/fido2-impl.md + - Build instructions: solo/building.md - Signed update process: solo/signed-updates.md - - Building: solo/building.md - Code documentation: solo/code-overview.md - Contributing Code: solo/contributing.md - Contributing Docs: solo/documenting.md - - What the udev?!: solo/udev.md + - udev Rules: solo/udev.md + - About: solo/repo-readme.md theme: name: material