From c20652b1c97b43fbf1b551fdf1dd8b7f567a4e01 Mon Sep 17 00:00:00 2001 From: Anne Henmi <41210220+ahh-docker@users.noreply.github.com> Date: Tue, 25 Sep 2018 17:52:02 -0600 Subject: [PATCH] Update rhel.md --- install/linux/docker-ee/rhel.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/install/linux/docker-ee/rhel.md b/install/linux/docker-ee/rhel.md index 7b7a5ba8f8..12d7bde0cd 100644 --- a/install/linux/docker-ee/rhel.md +++ b/install/linux/docker-ee/rhel.md @@ -46,13 +46,13 @@ On {{ linux-dist-long }}, Docker EE supports storage drivers, `overlay2` and `de ### FIPS 140-2 cryptographic module support -(Federal Information Processing Standards (FIPS) Publication 140-2[https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf] is a United States Federal security requirement for cryptographic modules. +(Federal Information Processing Standards (FIPS) Publication 140-2)[https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf] is a United States Federal security requirement for cryptographic modules. With Docker EE Basic license for versions 18.03 and later, Docker provides FIPS 140-2 support in RHEL 7.3, 7.4 and 7.5. This includes a FIPS support cryptographic module. If the RHEL implementation already has FIPS support enabled, FIPS is automatically enabled in the Docker engine. **NOTE:** FIPS is only supported in the Docker EE engine. UCP and DTR currently do not have support for FIPS-140-2. -To enable FIPS-140-2 compliance on a system that is not in FIPS mode, do the following: +To enable FIPS 140-2 compliance on a system that is not in FIPS 140-2 mode, do the following: Create a file called `/etc/systemd/system/docker.service.d/fips-module`. It needs to contain the following: @@ -73,7 +73,7 @@ Labels: com.docker.security.fips=enabled ``` -**NOTE:** If the system has the FIPS-140-2 cryptographic module installed on the operating system, it is possible to disable FIPS-140-2 compliance. To disable FIPS-140-2 in Docker but not the operating system, set the value `DOCKER_FIPS=0` in the `/etc/systemd/system/docker.service.d/fips-module`. +**NOTE:** If the system has the FIPS 140-2 cryptographic module installed on the operating system, it is possible to disable FIPS-140-2 compliance. To disable FIPS 140-2 in Docker but not the operating system, set the value `DOCKER_FIPS=0` in the `/etc/systemd/system/docker.service.d/fips-module`. ### Find your Docker EE repo URL