Skip to content
This repository was archived by the owner on Apr 19, 2023. It is now read-only.

Commit 8ce7586

Browse files
authored
Fix minor typos in the 'Authorization Services' guide (#1700)
1 parent e999186 commit 8ce7586

8 files changed

+11
-11
lines changed

authorization_services/topics/auth-services-terminology.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ That is, you can create individual policies, then reuse them with different perm
6161
Policy providers are implementations of specific policy types. {project_name} provides built-in policies, backed by their corresponding
6262
policy providers, and you can create your own policy types to support your specific requirements.
6363

64-
{project_name} provides a SPI (Service Provider Interface) that you can use to plug in your own policy provider implementations.
64+
{project_name} provides an SPI (Service Provider Interface) that you can use to plug in your own policy provider implementations.
6565

6666
[[_overview_terminology_permission_ticket]]
6767
== Permission ticket

authorization_services/topics/policy-js-policy.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,8 @@ if (identity.hasClientRole('my-client', 'my-client-role')) {
7474
}
7575
```
7676

77-
=== Checking for roles granted to an user
78-
To check for realm roles granted to an user:
77+
=== Checking for roles granted to a user
78+
To check for realm roles granted to a user:
7979

8080
```javascript
8181
const realm = $evaluation.getRealm();
@@ -85,7 +85,7 @@ if (realm.isUserInRealmRole('marta', 'role-a')) {
8585
}
8686
```
8787

88-
Or for client roles granted to an user:
88+
Or for client roles granted to a user:
8989

9090
```javascript
9191
const realm = $evaluation.getRealm();

authorization_services/topics/resource-server-default-config.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This permission is a <<_permission_create_resource, resource-based permission>>,
4545

4646
You can change the default configuration by removing the default resource, policy, or permission definitions and creating your own.
4747

48-
The default resource is created with an **URI** that maps to any resource or path in your application using a **/*** pattern. Before creating your own resources, permissions and policies, make
48+
The default resource is created with a **URI** that maps to any resource or path in your application using a **/*** pattern. Before creating your own resources, permissions and policies, make
4949
sure the default configuration doesn't conflict with your own settings.
5050

5151
[NOTE]

authorization_services/topics/resource-server-enable-authorization.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Disables the evaluation of all policies and allows access to all resources.
6868
+
6969
* *Decision Strategy*
7070
+
71-
This configurations changes how the policy evaluation engine decides whether or not a resource or scope should be granted based on the outcome from all evaluated permissions. `Affirmative` means that at least one permission must evaluate to a positive decision in order grant access to a resource and its scopes. `Unanimous` means that all permissions must evaluate to a positive decision in order for the final decision to be also positive. As an example, if two permissions for a same resource or scope are in conflict (one of them is granting access and the other is denying access), the permission to the resource or scope will be granted if the choosen strategy is `Affirmative`. Otherwise, a single deny from any permission will also deny access to the resource or scope.
71+
This configurations changes how the policy evaluation engine decides whether or not a resource or scope should be granted based on the outcome from all evaluated permissions. `Affirmative` means that at least one permission must evaluate to a positive decision in order grant access to a resource and its scopes. `Unanimous` means that all permissions must evaluate to a positive decision in order for the final decision to be also positive. As an example, if two permissions for a same resource or scope are in conflict (one of them is granting access and the other is denying access), the permission to the resource or scope will be granted if the chosen strategy is `Affirmative`. Otherwise, a single deny from any permission will also deny access to the resource or scope.
7272
+
7373
* *Remote Resource Management*
7474
+

authorization_services/topics/service-authorization-obtaining-permission-uma.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Resource owners are allowed to manage permissions to their resources and decide
2424
{project_name} is a UMA 2.0 compliant authorization server that provides most UMA capabilities.
2525

2626
As an example, consider a user Alice (resource owner) using an Internet Banking Service (resource server) to manage her Bank Account (resource). One day, Alice decides
27-
to open her bank account to Bob (requesting party), a accounting professional. However, Bob should only have access to view (scope) Alice's account.
27+
to open her bank account to Bob (requesting party), an accounting professional. However, Bob should only have access to view (scope) Alice's account.
2828

2929
As a resource server, the Internet Banking Service must be able to protect Alice's Bank Account. For that, it relies on {project_name}
3030
Resource Registration Endpoint to create a resource in the server representing Alice's Bank Account.

authorization_services/topics/service-authorization-obtaining-permission.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Indicates that responses from the server should contain any permission granted b
9292
+
9393
If the authorization request does not map to any permission, a `403` HTTP status code is returned instead.
9494

95-
Example of a authorization request when a client is seeking access to two resources protected by a resource server.
95+
Example of an authorization request when a client is seeking access to two resources protected by a resource server.
9696

9797
[source,bash,subs="attributes+"]
9898
----
@@ -105,7 +105,7 @@ curl -X POST \
105105
--data "permission=Resource B#Scope B"
106106
----
107107

108-
Example of a authorization request when a client is seeking access to any resource and scope protected by a resource server.
108+
Example of an authorization request when a client is seeking access to any resource and scope protected by a resource server.
109109
NOTE: This will not evaluate the permissions for all resources. Instead, the permissions for resources owned by the resource server, owned by the requesting user,
110110
and explicitly granted to the requesting user by other owners are evaluated.
111111

authorization_services/topics/service-authorization-uma-authz-process.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
In UMA, the authorization process starts when a client tries to access a UMA protected resource server.
55

66
A UMA protected resource server expects a bearer token in the request where the token is an RPT. When a client requests
7-
a resource at the resource server without a RPT:
7+
a resource at the resource server without an RPT:
88

99
.Client requests a protected resource without sending an RPT
1010
```bash

authorization_services/topics/service-protection-resources-api-papi.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ curl -v -X POST \
4141
}'
4242
----
4343

44-
By default, the owner of a resource is the resource server. If you want to define a different owner, such as an
44+
By default, the owner of a resource is the resource server. If you want to define a different owner, such as a
4545
specific user, you can send a request as follows:
4646

4747
[source,bash,subs="attributes+"]

0 commit comments

Comments
 (0)