From d08d4202edff9de0f33456db243adae518e5e801 Mon Sep 17 00:00:00 2001 From: Jen Malloy Date: Tue, 21 Mar 2017 14:25:37 -0400 Subject: [PATCH] fixed RHSSO-870 --- securing_apps/topics/oidc/javascript-adapter.adoc | 2 +- securing_apps/topics/saml/java/debugging.adoc | 4 +--- .../java/general-config/sp_principalname_mapping_element.adoc | 3 +-- 3 files changed, 3 insertions(+), 6 deletions(-) diff --git a/securing_apps/topics/oidc/javascript-adapter.adoc b/securing_apps/topics/oidc/javascript-adapter.adoc index 84da586906..92383c9d23 100644 --- a/securing_apps/topics/oidc/javascript-adapter.adoc +++ b/securing_apps/topics/oidc/javascript-adapter.adoc @@ -206,7 +206,7 @@ realmAccess:: The realm roles associated with the token. resourceAccess:: - The resource roles assocaited with the token. + The resource roles associated with the token. refreshToken:: The base64 encoded refresh token that can be used to retrieve a new token. diff --git a/securing_apps/topics/saml/java/debugging.adoc b/securing_apps/topics/saml/java/debugging.adoc index 84fb0696a7..e1469caa52 100644 --- a/securing_apps/topics/saml/java/debugging.adoc +++ b/securing_apps/topics/saml/java/debugging.adoc @@ -1,6 +1,4 @@ ==== Troubleshooting -The best way to troubleshoot some problems is to turn on debugging for saml in both the client adapter and the {{book.project.name}} server. -To do this turn on debugging int the `org.keycloak.saml` package to `debug` in your log4j or other logging framework. -Turning this on allows you to see the SAML requests and response documents being sent to and from the server. +The best way to troubleshoot problems is to turn on debugging for SAML in both the client adapter and {{book.project.name}} Server. Using your logging framework, set the log level to `DEBUG` for the `org.keycloak.saml` package. Turning this on allows you to see the SAML requests and response documents being sent to and from the server. diff --git a/securing_apps/topics/saml/java/general-config/sp_principalname_mapping_element.adoc b/securing_apps/topics/saml/java/general-config/sp_principalname_mapping_element.adoc index 32c0d2ddcb..8fb3b1bf8c 100644 --- a/securing_apps/topics/saml/java/general-config/sp_principalname_mapping_element.adoc +++ b/securing_apps/topics/saml/java/general-config/sp_principalname_mapping_element.adoc @@ -2,8 +2,7 @@ ===== SP PrincipalNameMapping element This element is optional. -When creating a Java Principal object that you obtain from methods like `HttpServletRequest.getUserPrincipal()`, you can -define what name that is returned by the `Principal.getName()` method. +When creating a Java Principal object that you obtain from methods such as `HttpServletRequest.getUserPrincipal()`, you can define what name is returned by the `Principal.getName()` method. [source,xml] ----