From f6b440f95e7520dafebe50dd8bffe9e834240a2f Mon Sep 17 00:00:00 2001 From: Simon Brown Date: Thu, 17 Mar 2016 19:12:12 +0000 Subject: [PATCH] Typo. --- docs/client-side-encryption.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/client-side-encryption.md b/docs/client-side-encryption.md index ee77d7c..ca37e10 100644 --- a/docs/client-side-encryption.md +++ b/docs/client-side-encryption.md @@ -1,6 +1,6 @@ # Client-side encryption -The JSON representation of your workspace is stored on the Structurizr servers using AES encryption with a 128-bit key, a random salt and a server-side passphrase. For additional peace of mind, if you're a [Enterprise Plan](https://structurizr.com/pricing) customer, you can choose to encrypt your workspace with your own passphrase on the client before uploading it to Structurizr. In order to view a client-side encrypted workspace, you will be asked to enter your passphrase when you open the workspace in your web browser. The passphrase is then used to decrypt the workspace in your web browser - at no point does the passphrase leave your computer. +The JSON representation of your workspace is stored on the Structurizr servers using AES encryption with a 128-bit key, a random salt and a server-side passphrase. For additional peace of mind, if you're an [Enterprise Plan](https://structurizr.com/pricing) customer, you can choose to encrypt your workspace with your own passphrase on the client before uploading it to Structurizr. In order to view a client-side encrypted workspace, you will be asked to enter your passphrase when you open the workspace in your web browser. The passphrase is then used to decrypt the workspace in your web browser - at no point does the passphrase leave your computer. To use client-side encryption, simply create an instance of ```AesEncryptionStrategy``` and associate it with your ```StructurizrClient``` instance. For example: