Skip to content

Commit a234ff4

Browse files
committed
Prettify
1 parent 975aea8 commit a234ff4

1 file changed

Lines changed: 16 additions & 10 deletions

File tree

README.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,8 @@ git checkout NGSI-v2
281281
```
282282

283283
> [!NOTE]
284-
> The initial creation of Docker images can take up to three minutes
284+
>
285+
> The initial creation of Docker images can take up to three minutes
285286

286287
Thereafter, all services can be initialized from the command-line by running the
287288
[services](https://github.com/FIWARE/tutorials.Securing-Access/blob/NGSI-v2/services) Bash script provided within the
@@ -292,6 +293,7 @@ repository:
292293
```
293294

294295
> [!NOTE]
296+
>
295297
> If you want to clean up and start over again you can do so with the following command:
296298
>
297299
> ```console
@@ -421,7 +423,8 @@ curl -iX POST \
421423
```
422424

423425
> [!NOTE]
424-
> The username in the grant matches the email address of the user in this instance.
426+
>
427+
> The username in the grant matches the email address of the user in this instance.
425428
426429
#### Response
427430

@@ -579,9 +582,10 @@ The user must then authorize the request
579582
The response displays the user on the top right of the screen, details of the token are also flashed onto the screen.
580583

581584
> [!NOTE]
582-
> Unless you deliberately log out of **Keyrock** > `http://localhost:3005`, the existing **Keyrock** session
583-
> which has already permitted access will be used for subsequent authorization requests, so the **Keyrock** login screen
584-
> will not be shown again.
585+
>
586+
> Unless you deliberately log out of **Keyrock** > `http://localhost:3005`, the existing **Keyrock** session which has
587+
> already permitted access will be used for subsequent authorization requests, so the **Keyrock** login screen will not
588+
> be shown again.
585589
586590
## Implicit Grant
587591

@@ -630,8 +634,9 @@ The user must then authorize the request
630634
The response displays the user on the top right of the screen, details of the token are also flashed onto the screen.
631635

632636
> [!NOTE]
633-
> Unless you deliberately log out of **Keyrock** > `http://localhost:3005`, the existing **Keyrock** session
634-
> which has already permitted access will be used for subsequent authorization request.
637+
>
638+
> Unless you deliberately log out of **Keyrock** > `http://localhost:3005`, the existing **Keyrock** session which has
639+
> already permitted access will be used for subsequent authorization request.
635640
636641
## Client Credentials Grant
637642

@@ -864,7 +869,7 @@ As a reminder, **Keyrock** permissions are based on `resource` (e.g. URL) and `a
864869
verb). We can retrieve extended user details including access permissions by adding additional parameters to a `/user`
865870
GET request
866871

867-
#### 7️⃣ Request
872+
#### 7️⃣ Request
868873

869874
```console
870875
curl -X GET \
@@ -969,6 +974,7 @@ function sendCommand(req, res) {
969974
## PDP Access Control - Running the Example
970975

971976
> [!NOTE]
977+
>
972978
> Only four resources have been secured at level 2:
973979
>
974980
> - sending the unlock door command
@@ -999,8 +1005,8 @@ function sendCommand(req, res) {
9991005
Eve has an account, but no roles in the application.
10001006

10011007
> [!NOTE]
1002-
> As Eve has a recognized account, she gains full authentication access, even though her account has no roles
1003-
> attached.
1008+
>
1009+
> As Eve has a recognized account, she gains full authentication access, even though her account has no roles attached.
10041010
10051011
- From `http://localhost:3000`, log in as `eve@example.com` with the password `test`
10061012

0 commit comments

Comments
 (0)