diff --git a/extension/jami-extension-certificate.md b/extension/jami-extension-certificate.md
index 1224065f2936fd5178e00a084e31275f563bf234..9f896b4ec9df5e1476b774dc0d9c57962295309c 100644
--- a/extension/jami-extension-certificate.md
+++ b/extension/jami-extension-certificate.md
@@ -1,9 +1,11 @@
 # Jami extension certificates
 
-**NOTE: This page describes the architecture of certificates on the Jami Extension Store.**
+```{note}
+This page describes the architecture of certificates on the Jami Extension Store.
+```
 
 The Jami team introduced extensions as a call/chat feature for GNU/Linux, Windows, macOS, and Android, providing users the ability to personalize the call/chat experience.
-To learn more about Jami extensions, visit the [Extension manual](./extension.md).
+To learn more about Jami extensions, visit the [Extension manual](index).
 The Jami team implemented a Jami Extension Store to be able to distribute extensions from the Jami team and from third parties.
 A certificate mechanism is required to ensure trust in the Jami team and third-party extensions.
 Certificates play a crucial role in verifying the authenticity of extensions available on the Jami Extension Store.
@@ -84,19 +86,19 @@ The certificate chain is the following: Store Root CA `→` Organization Certifi
 The root certificate structure is:
 
 ```bash
-    Certificate:
-        tbsCertificate:
-            version: 2
-            serialNumber: <generate-by-design>
-            signature: AlgorithmIdentifier { algorithm: sha512WithRSAEncryption }
-            issuer: Name { commonName: "Store Root CA" }
-            validity:
-                notBefore: Time { utcTime: "20220101000000Z" }
-                notAfter: Time { utcTime: "20520101000000Z" }
-            subject: Name { commonName: "Store Root CA" }
-            subjectPublicKeyInfo:
-                algorithm: AlgorithmIdentifier { algorithm: id-ecdsa-with-shake256 }
-                subjectPublicKey: BIT STRING (ECDSA-256 public key)
+Certificate:
+    tbsCertificate:
+        version: 2
+        serialNumber: <generate-by-design>
+        signature: AlgorithmIdentifier { algorithm: sha512WithRSAEncryption }
+        issuer: Name { commonName: "Store Root CA" }
+        validity:
+            notBefore: Time { utcTime: "20220101000000Z" }
+            notAfter: Time { utcTime: "20520101000000Z" }
+        subject: Name { commonName: "Store Root CA" }
+        subjectPublicKeyInfo:
+            algorithm: AlgorithmIdentifier { algorithm: id-ecdsa-with-shake256 }
+            subjectPublicKey: BIT STRING (ECDSA-256 public key)
 ```
 This structure is based on [RFC standard certificate v3](https://www.ietf.org/rfc/rfc2459.txt).
 
@@ -251,4 +253,4 @@ python3 ./certKey.py revoke --crl /tmp/bar --subject /tmp/foo --issuer /tmp/bar
 
 ```bash
 python3 ./certKey.py  --plugin verify --path /tmp/foo
-```
+```
\ No newline at end of file