@@ -54,7 +54,7 @@ verification. These parameters are deduced by
54
54
to request changes to this MSP configuration (e.g. root CAs, intermediate CAs)
55
55
- A list of Organizational Units that valid members of this MSP should
56
56
include in their X.509 certificate; this is an optional configuration
57
- parameter, used when, e.g., multiple organisations leverage the same
57
+ parameter, used when, e.g., multiple organizations leverage the same
58
58
root of trust, and intermediate CAs, and have reserved an OU field for
59
59
their members
60
60
- A list of certificate revocation lists (CRLs) each corresponding to
@@ -95,7 +95,7 @@ How to generate MSP certificates and their signing keys?
95
95
--------------------------------------------------------
96
96
97
97
To generate X.509 certificates to feed its MSP configuration, the application
98
- can use `Openssl <https://www.openssl.org/ >`_. We emphasise that in Hyperledger
98
+ can use `Openssl <https://www.openssl.org/ >`_. We emphasize that in Hyperledger
99
99
Fabric there is no support for certificates including RSA keys.
100
100
101
101
Alternatively one can use ``cryptogen `` tool, whose operation is explained in
@@ -223,7 +223,7 @@ reject the system genesis block, if the latter includes two MSPs with the same
223
223
identifier, and consequently the bootstrapping of the network would fail.
224
224
225
225
For application channels, the verification components of only the MSPs that
226
- govern a channel need to reside in the channel's genesis block. We emphasise
226
+ govern a channel need to reside in the channel's genesis block. We emphasize
227
227
that it is **the responsibility of the application ** to ensure that correct
228
228
MSP configuration information is included in the genesis blocks (or the
229
229
most recent configuration block) of a channel prior to instructing one or
@@ -261,7 +261,7 @@ considered:
261
261
data with a set of peers that are members of the same subdivision, and NOT with
262
262
the full set of providers constituting the actual organization.
263
263
- **Multiple organizations using a single MSP. ** This corresponds to a
264
- case of a consortium of organisations that are governed by similar
264
+ case of a consortium of organizations that are governed by similar
265
265
membership architecture. One needs to know here that peers would propagate
266
266
organization-scoped messages to the peers that have an identity under the
267
267
same MSP regardless of whether they belong to the same actual organization.
@@ -282,7 +282,7 @@ Two ways to handle this:
282
282
a chaincode. A limitation of this approach is that gossip peers would
283
283
consider peers with membership identities under their local MSP as
284
284
members of the same organization, and would consequently gossip
285
- with them organisation -scoped data (e.g. their status).
285
+ with them organization -scoped data (e.g. their status).
286
286
- **Defining one MSP to represent each division **. This would involve specifying for each
287
287
division, a set of certificates for root CAs, intermediate CAs, and admin
288
288
Certs, such that there is no overlapping certification path across MSPs.
0 commit comments