Fix typos

This commit is contained in:
k-tamura 2019-08-30 17:03:34 +09:00 committed by Stian Thorgersen
parent 09db3492d1
commit 7c6fe427f7
3 changed files with 10 additions and 10 deletions

View file

@ -33,7 +33,7 @@ responds with a *401* status code and a `WWW-Authenticate` header.
```bash
HTTP/1.1 401 Unauthorized
WWW-Authenticate: UMA realm="${realm}",
as_uri="https://${host}:${post}/auth/realms/${realm}",
as_uri="https://${host}:${port}/auth/realms/${realm}",
ticket="016f84e8-f9b9-11e0-bd6f-0021cc6004de"
```

View file

@ -22,11 +22,11 @@ As a result, you should get a response as follows:
// some claims are expected here
// these are the main claims in the discovery document about Authorization Services endpoints location
"token_endpoint": "http://${host}:${post}/auth/realms/${realm}/protocol/openid-connect/token",
"token_introspection_endpoint": "http://${host}:${post}/auth/realms/${realm}/protocol/openid-connect/token/introspect",
"resource_registration_endpoint": "http://${host}:${post}/auth/realms/${realm}/authz/protection/resource_set",
"permission_endpoint": "http://${host}:${post}/auth/realms/${realm}/authz/protection/permission",
"policy_endpoint": "http://${host}:${post}/auth/realms/${realm}/authz/protection/uma-policy"
"token_endpoint": "http://${host}:${port}/auth/realms/${realm}/protocol/openid-connect/token",
"token_introspection_endpoint": "http://${host}:${port}/auth/realms/${realm}/protocol/openid-connect/token/introspect",
"resource_registration_endpoint": "http://${host}:${port}/auth/realms/${realm}/authz/protection/resource_set",
"permission_endpoint": "http://${host}:${port}/auth/realms/${realm}/authz/protection/permission",
"policy_endpoint": "http://${host}:${port}/auth/realms/${realm}/authz/protection/uma-policy"
}
```

View file

@ -127,25 +127,25 @@ curl -X DELETE \
To query the permissions associated with a resource, send an HTTP GET request as follows:
```bash
http://${host}:${post}/auth/realms/${realm}/authz/protection/uma-policy?resource={resource_id}
http://${host}:${port}/auth/realms/${realm}/authz/protection/uma-policy?resource={resource_id}
```
To query the permissions given its name, send an HTTP GET request as follows:
```bash
http://${host}:${post}/auth/realms/${realm}/authz/protection/uma-policy?name=Any people manager
http://${host}:${port}/auth/realms/${realm}/authz/protection/uma-policy?name=Any people manager
```
To query the permissions associated with a specific scope, send an HTTP GET request as follows:
```bash
http://${host}:${post}/auth/realms/${realm}/authz/protection/uma-policy?scope=read
http://${host}:${port}/auth/realms/${realm}/authz/protection/uma-policy?scope=read
```
To query all permissions, send an HTTP GET request as follows:
```bash
http://${host}:${post}/auth/realms/${realm}/authz/protection/uma-policy
http://${host}:${port}/auth/realms/${realm}/authz/protection/uma-policy
```
When querying the server for permissions use parameters `first` and `max` results to limit the result.