Skip to content

Commit

Permalink
Markdown linter
Browse files Browse the repository at this point in the history
  • Loading branch information
oharsta committed Sep 5, 2024
1 parent 7b76c24 commit 54c59ef
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,15 +117,15 @@ To become an institution admin in invite, add the following values as `eduPerson

There are several security filters in Invite:

* OAuth2 login where the user logs in with OpenIDConnect. Invite is acting as a backend server and cookies are used to
- OAuth2 login where the user logs in with OpenIDConnect. Invite is acting as a backend server and cookies are used to
identify the user in the security context.
* Access token login where the user has logged in with OpenIDConnect and the client obtained an access token. Invite is
- Access token login where the user has logged in with OpenIDConnect and the client obtained an access token. Invite is
acting as a resource server. The API is stateless and for now no token introspects are cached.
* Basic Authentication for voot, teams, aa, profile, deprovision and sp_dashboard endpoints. The API is stateless and the
API users are stored in memory. Endpoints are also secured by scope.
* API token header (`X-API-TOKEN`) generated for institutional_admins (or super_users) in the GUI. The user stored in the
security context is the first user with the same organisational GUID (or super_user) as the user who has generated the
token.
- Basic Authentication for voot, teams, aa, profile, deprovision and sp_dashboard endpoints. The API is stateless and
the API users are stored in memory. Endpoints are also secured by scope.
- API token header (`X-API-TOKEN`) generated for institutional_admins (or super_users) in the GUI. The user stored in
the security context is the first user with the same organisational GUID (or super_user) as the user who has generated
the token.

### Provisioning Secrets

Expand Down

0 comments on commit 54c59ef

Please sign in to comment.