Skip to content

Commit

Permalink
Merge pull request quarkusio#32641 from michelle-purcell/security-arc…
Browse files Browse the repository at this point in the history
…hitecture-docs

Fixed minor typos in doc content
  • Loading branch information
gsmet authored Apr 14, 2023
2 parents 8ea63cd + fa019c0 commit 2799b22
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/src/main/asciidoc/security-architecture-concept.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ The sequential security validation process results in one of three outcomes:

* The HTTP request is authenticated and authorized and access to the Quarkus application is granted
* The HTTP request authentication fails and the requester receives a challenge
* The HTTP request authorization fails and and the requester's access to the Quarkus applicaton is denied
* The HTTP request authorization fails and the requester's access to the Quarkus applicaton is denied

The following diagram steps through the detailed process flow of the Quarkus Security architecture:

Expand All @@ -44,7 +44,7 @@ For more information, see xref:security-identity-providers-concept.adoc[Identity
Because Quarkus Security is customizable, for example, you can add authorization roles to `SecurityIdentity`, you can register and prioritize one or more custom security augmentors.

Registered instances of `SecurityIdentityAugmentor` are invoked during the final stage of the security authentication process.
For more information see the xref:security-customization.adoc#security-identity-customization[Security Identity Customization] section of the "Security Tips and Tricks" guide.
For more information, see the xref:security-customization.adoc#security-identity-customization[Security Identity Customization] section of the "Security Tips and Tricks" guide.


== Supported authentication mechanisms
Expand Down

0 comments on commit 2799b22

Please sign in to comment.