Merge pull request #11 from ccopelloRH/RHSSO606

RHSSO606 updates
This commit is contained in:
ccopelloRH 2016-12-01 11:10:16 -05:00 committed by GitHub
commit 1a7caf4adb
3 changed files with 11 additions and 15 deletions

View file

@ -12,7 +12,7 @@
"title": "Getting Started Guide", "title": "Getting Started Guide",
"project": { "project": {
"name": "Red Hat Single Sign-On", "name": "Red Hat Single Sign-On",
"version": "7.0.0" "version": "7.1-Beta"
}, },
"community": false, "community": false,
"product": true, "product": true,

View file

@ -6,7 +6,7 @@ markup = asciidoc
[metadata] [metadata]
title = Getting Started Guide title = Getting Started Guide
product = Red Hat Single Sign-On product = Red Hat Single Sign-On
version = 7.0 version = 7.1.0
edition = edition =
subtitle = subtitle =
keywords = keywords =
@ -17,5 +17,3 @@ reporting_url =
type = type =
product = product =
component = Documentation component = Documentation

View file

@ -8,7 +8,7 @@ installed on your machine and available in your PATH before you can continue:
* Apache Maven 3.1.1 or higher * Apache Maven 3.1.1 or higher
* Git * Git
You can obtain the code by cloning the repository at {{book.quickstartRepo}}. Follow these steps to download the code, build it, You can obtain the code by cloning the repository at {{book.quickstartRepo}}. Use the branch matching the version of Red Hat Single Sign-On in use. Follow these steps to download the code, build it,
and deploy it. Make sure your {{book.appServer}} application server is started before you run these steps. and deploy it. Make sure your {{book.appServer}} application server is started before you run these steps.
.Clone Project .Clone Project
@ -37,5 +37,3 @@ image:../../{{book.images}}/client-auth-required.png[]
The application is not secured by any identity provider, so anything you enter in the dialog box will result in a `Forbidden` message being The application is not secured by any identity provider, so anything you enter in the dialog box will result in a `Forbidden` message being
sent back by the server. The next section describes how you can take this deployed application and secure it. sent back by the server. The next section describes how you can take this deployed application and secure it.