Fix minor typos in the 'Authorization Services' guide (#1700)

This commit is contained in:
Marc Wrobel 2022-10-19 08:33:25 +02:00 committed by GitHub
parent e999186b84
commit 8ce75864cb
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
8 changed files with 11 additions and 11 deletions

View file

@ -61,7 +61,7 @@ That is, you can create individual policies, then reuse them with different perm
Policy providers are implementations of specific policy types. {project_name} provides built-in policies, backed by their corresponding
policy providers, and you can create your own policy types to support your specific requirements.
{project_name} provides a SPI (Service Provider Interface) that you can use to plug in your own policy provider implementations.
{project_name} provides an SPI (Service Provider Interface) that you can use to plug in your own policy provider implementations.
[[_overview_terminology_permission_ticket]]
== Permission ticket

View file

@ -74,8 +74,8 @@ if (identity.hasClientRole('my-client', 'my-client-role')) {
}
```
=== Checking for roles granted to an user
To check for realm roles granted to an user:
=== Checking for roles granted to a user
To check for realm roles granted to a user:
```javascript
const realm = $evaluation.getRealm();
@ -85,7 +85,7 @@ if (realm.isUserInRealmRole('marta', 'role-a')) {
}
```
Or for client roles granted to an user:
Or for client roles granted to a user:
```javascript
const realm = $evaluation.getRealm();

View file

@ -45,7 +45,7 @@ This permission is a <<_permission_create_resource, resource-based permission>>,
You can change the default configuration by removing the default resource, policy, or permission definitions and creating your own.
The default resource is created with an **URI** that maps to any resource or path in your application using a **/*** pattern. Before creating your own resources, permissions and policies, make
The default resource is created with a **URI** that maps to any resource or path in your application using a **/*** pattern. Before creating your own resources, permissions and policies, make
sure the default configuration doesn't conflict with your own settings.
[NOTE]

View file

@ -68,7 +68,7 @@ Disables the evaluation of all policies and allows access to all resources.
+
* *Decision Strategy*
+
This configurations changes how the policy evaluation engine decides whether or not a resource or scope should be granted based on the outcome from all evaluated permissions. `Affirmative` means that at least one permission must evaluate to a positive decision in order grant access to a resource and its scopes. `Unanimous` means that all permissions must evaluate to a positive decision in order for the final decision to be also positive. As an example, if two permissions for a same resource or scope are in conflict (one of them is granting access and the other is denying access), the permission to the resource or scope will be granted if the choosen strategy is `Affirmative`. Otherwise, a single deny from any permission will also deny access to the resource or scope.
This configurations changes how the policy evaluation engine decides whether or not a resource or scope should be granted based on the outcome from all evaluated permissions. `Affirmative` means that at least one permission must evaluate to a positive decision in order grant access to a resource and its scopes. `Unanimous` means that all permissions must evaluate to a positive decision in order for the final decision to be also positive. As an example, if two permissions for a same resource or scope are in conflict (one of them is granting access and the other is denying access), the permission to the resource or scope will be granted if the chosen strategy is `Affirmative`. Otherwise, a single deny from any permission will also deny access to the resource or scope.
+
* *Remote Resource Management*
+

View file

@ -24,7 +24,7 @@ Resource owners are allowed to manage permissions to their resources and decide
{project_name} is a UMA 2.0 compliant authorization server that provides most UMA capabilities.
As an example, consider a user Alice (resource owner) using an Internet Banking Service (resource server) to manage her Bank Account (resource). One day, Alice decides
to open her bank account to Bob (requesting party), a accounting professional. However, Bob should only have access to view (scope) Alice's account.
to open her bank account to Bob (requesting party), an accounting professional. However, Bob should only have access to view (scope) Alice's account.
As a resource server, the Internet Banking Service must be able to protect Alice's Bank Account. For that, it relies on {project_name}
Resource Registration Endpoint to create a resource in the server representing Alice's Bank Account.

View file

@ -92,7 +92,7 @@ Indicates that responses from the server should contain any permission granted b
+
If the authorization request does not map to any permission, a `403` HTTP status code is returned instead.
Example of a authorization request when a client is seeking access to two resources protected by a resource server.
Example of an authorization request when a client is seeking access to two resources protected by a resource server.
[source,bash,subs="attributes+"]
----
@ -105,7 +105,7 @@ curl -X POST \
--data "permission=Resource B#Scope B"
----
Example of a authorization request when a client is seeking access to any resource and scope protected by a resource server.
Example of an authorization request when a client is seeking access to any resource and scope protected by a resource server.
NOTE: This will not evaluate the permissions for all resources. Instead, the permissions for resources owned by the resource server, owned by the requesting user,
and explicitly granted to the requesting user by other owners are evaluated.

View file

@ -4,7 +4,7 @@
In UMA, the authorization process starts when a client tries to access a UMA protected resource server.
A UMA protected resource server expects a bearer token in the request where the token is an RPT. When a client requests
a resource at the resource server without a RPT:
a resource at the resource server without an RPT:
.Client requests a protected resource without sending an RPT
```bash

View file

@ -41,7 +41,7 @@ curl -v -X POST \
}'
----
By default, the owner of a resource is the resource server. If you want to define a different owner, such as an
By default, the owner of a resource is the resource server. If you want to define a different owner, such as a
specific user, you can send a request as follows:
[source,bash,subs="attributes+"]