Skip to content

Commit 874e951

Browse files
committed
fixes
Signed-off-by: alexmerlin <alex.merlin.1985@gmail.com>
1 parent 8c1874e commit 874e951

2 files changed

Lines changed: 16 additions & 16 deletions

File tree

docs/book/v4/tutorials/token-authentication.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,23 +11,23 @@ and it consists of an alphanumeric string.
1111
In order to protect specific resources, clients need to be authenticated with user/admin roles. These roles are
1212
identified from the access token sent via the `Authorization` header.
1313

14-
When DotKernel API receives a request, it tries to read the access token:
14+
When DotKernel API receives a request, it tries to read the access token.
1515

16-
- if it does not find an access token, client has `guest` role:
17-
- if the requested endpoint needs no authentication, the requested resource is returned
18-
- else, a `403 Forbidden` response is returned
19-
- else, client's account is identified and client has `admin`/`user` role (the one assigned in their account)
20-
- if the requested endpoint is accessible to the client, the requested resource is returned
21-
- else, a `403 Forbidden` response is returned
16+
If it does not find an access token, client has `guest` role:
17+
- if the requested endpoint needs no authentication, the requested resource is returned
18+
- else, a `403 Forbidden` response is returned
19+
Else, client's account is identified and client has `admin`/`user` role (the one assigned in their account)
20+
- if the requested endpoint is accessible to the client, the requested resource is returned
21+
- else, a `403 Forbidden` response is returned
2222

23-
DotKernel API provides out-of-the-box both:
23+
DotKernel API provides out-of-the-box both an `admin` and a `user` account.
2424

25-
- an account with **role** set to both `superuser` and `admin` with the following credentials:
26-
- **identity**: `admin`
27-
- **password**: `dotkernel`
28-
- an account with **role** set to both `user` and `guest` with the following credentials:
29-
- **identify**: `test@dotkernel.com`
30-
- **password**: `dotkernel`
25+
The admin account with **role** set to both `superuser` and `admin` with the following credentials:
26+
- **identity**: `admin`
27+
- **password**: `dotkernel`
28+
The user account with **role** set to both `user` and `guest` with the following credentials:
29+
- **identify**: `test@dotkernel.com`
30+
- **password**: `dotkernel`
3131

3232
## Flow
3333

@@ -44,7 +44,7 @@ DotKernel API provides out-of-the-box both:
4444
4545
For a better overview of the flow, see the below image:
4646

47-
![](https://docs.dotkernel.org/img/api/token-authentication.png "Token authentication flow")
47+
![Token authentication flow](https://docs.dotkernel.org/img/api/token-authentication.png)
4848

4949
## Generate admin access token
5050

mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ nav:
3737
- "Generate tokens": v4/commands/generate-tokens.md
3838
- Tutorials:
3939
- "Creating a book module": v4/tutorials/create-book-module.md
40-
- "Creating a book module": v4/tutorials/token-authentication.md
40+
- "Token authentication": v4/tutorials/token-authentication.md
4141
- Transition from API Tools:
4242
- "Laminas API Tools vs DotKernel API": v4/transition-from-api-tools/api-tools-vs-dotkernel-api.md
4343
- "Transition Approach": v4/transition-from-api-tools/transition-approach.md

0 commit comments

Comments
 (0)