From 6c03b48fe99a8a9e0de6d0fc35bba52010f554c1 Mon Sep 17 00:00:00 2001 From: Michelle Purcell <92924207+michelle-purcell@users.noreply.github.com> Date: Tue, 12 Sep 2023 15:27:30 +0100 Subject: [PATCH] Update docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc Co-authored-by: Mickey Maler --- .../security-oidc-bearer-token-authentication-tutorial.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc index 17d356a96c77d9..db20c91cc2e9dc 100644 --- a/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc +++ b/docs/src/main/asciidoc/security-oidc-bearer-token-authentication-tutorial.adoc @@ -38,7 +38,7 @@ Any user with a valid token can access the `/api/users/me` endpoint. As a response, it returns a JSON document with user details obtained from the information in the token. The `/api/admin` endpoint is protected with RBAC (Role-Based Access Control), which only users with the `admin` role can access. -At this endpoint, the `@RolesAllowed` annotation is used to declaratively enforce the access constraint. +At this endpoint, the `@RolesAllowed` annotation is used to enforce the access constraint declaratively. == Solution