@@ -281,7 +281,8 @@ git checkout NGSI-v2
281281` ` `
282282
283283> [!NOTE]
284- > The initial creation of Docker images can take up to three minutes
284+ >
285+ > The initial creation of Docker images can take up to three minutes
285286
286287Thereafter, all services can be initialized from the command-line by running the
287288[services](https://github.com/FIWARE/tutorials.Securing-Access/blob/NGSI-v2/services) Bash script provided within the
@@ -292,6 +293,7 @@ repository:
292293` ` `
293294
294295> [!NOTE]
296+ >
295297> If you want to clean up and start over again you can do so with the following command:
296298>
297299> ```console
@@ -421,7 +423,8 @@ curl -iX POST \
421423```
422424
423425> [ !NOTE]
424- > The username in the grant matches the email address of the user in this instance.
426+ >
427+ > The username in the grant matches the email address of the user in this instance.
425428
426429#### Response
427430
@@ -579,9 +582,10 @@ The user must then authorize the request
579582The response displays the user on the top right of the screen, details of the token are also flashed onto the screen.
580583
581584> [ !NOTE]
582- > Unless you deliberately log out of ** Keyrock** > ` http://localhost:3005 ` , the existing ** Keyrock** session
583- > which has already permitted access will be used for subsequent authorization requests, so the ** Keyrock** login screen
584- > will not be shown again.
585+ >
586+ > Unless you deliberately log out of ** Keyrock** > ` http://localhost:3005 ` , the existing ** Keyrock** session which has
587+ > already permitted access will be used for subsequent authorization requests, so the ** Keyrock** login screen will not
588+ > be shown again.
585589
586590## Implicit Grant
587591
@@ -630,8 +634,9 @@ The user must then authorize the request
630634The response displays the user on the top right of the screen, details of the token are also flashed onto the screen.
631635
632636> [ !NOTE]
633- > Unless you deliberately log out of ** Keyrock** > ` http://localhost:3005 ` , the existing ** Keyrock** session
634- > which has already permitted access will be used for subsequent authorization request.
637+ >
638+ > Unless you deliberately log out of ** Keyrock** > ` http://localhost:3005 ` , the existing ** Keyrock** session which has
639+ > already permitted access will be used for subsequent authorization request.
635640
636641## Client Credentials Grant
637642
@@ -864,7 +869,7 @@ As a reminder, **Keyrock** permissions are based on `resource` (e.g. URL) and `a
864869verb). We can retrieve extended user details including access permissions by adding additional parameters to a ` /user `
865870GET request
866871
867- #### 7️⃣ Request
872+ #### 7️⃣ Request
868873
869874``` console
870875 curl -X GET \
@@ -969,6 +974,7 @@ function sendCommand(req, res) {
969974## PDP Access Control - Running the Example
970975
971976> [ !NOTE]
977+ >
972978> Only four resources have been secured at level 2:
973979>
974980> - sending the unlock door command
@@ -999,8 +1005,8 @@ function sendCommand(req, res) {
9991005Eve has an account, but no roles in the application.
10001006
10011007> [ !NOTE]
1002- > As Eve has a recognized account, she gains full authentication access, even though her account has no roles
1003- > attached.
1008+ >
1009+ > As Eve has a recognized account, she gains full authentication access, even though her account has no roles attached.
10041010
10051011- From ` http://localhost:3000 ` , log in as ` eve@example.com ` with the password ` test `
10061012
0 commit comments