From f59c3ba2284dc7a629b06a637959e7a3d64637f8 Mon Sep 17 00:00:00 2001 From: taivlam <47955724+taivlam@users.noreply.github.com> Date: Sat, 16 Apr 2022 07:27:32 +0000 Subject: [PATCH] Correct 2 typos on MFA page (#1039) Correct spelling of "separate" and "document" Signed-off-by: Daniel Gray --- docs/security/multi-factor-authentication.en.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/security/multi-factor-authentication.en.md b/docs/security/multi-factor-authentication.en.md index a593d2cb..c05f1d84 100644 --- a/docs/security/multi-factor-authentication.en.md +++ b/docs/security/multi-factor-authentication.en.md @@ -108,7 +108,7 @@ When using TOTP with an authenticator app, be sure to back up your recovery keys ### Initial setup -When buying a security key, it is important that you change the default credentials, setup password protection for the key, and enable touch confirmation if your key supports it. Products such as the [YubiKey](#yubico-otp) have multiple interfaces with seperate credentials for each one of them, so you should go over each interface and set up protection as well. +When buying a security key, it is important that you change the default credentials, setup password protection for the key, and enable touch confirmation if your key supports it. Products such as the [YubiKey](#yubico-otp) have multiple interfaces with separate credentials for each one of them, so you should go over each interface and set up protection as well. ### Email and SMS @@ -163,4 +163,4 @@ SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second factor authentication. Yubico has provided a documennt for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website.