From c84309946634460e0ecfcd9fc5713b869b7c94b9 Mon Sep 17 00:00:00 2001 From: Andri Reveli Date: Mon, 7 Nov 2022 18:55:57 +0100 Subject: [PATCH] Fix table entries in documentation --- docs/src/main/asciidoc/security-getting-started.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/src/main/asciidoc/security-getting-started.adoc b/docs/src/main/asciidoc/security-getting-started.adoc index d6a4502f4c363..715bcc3bbbddf 100644 --- a/docs/src/main/asciidoc/security-getting-started.adoc +++ b/docs/src/main/asciidoc/security-getting-started.adoc @@ -23,9 +23,9 @@ The steps in this tutorial guide you through building an application that provid |=== |Endpoint | Description |`/api/public`| The `/api/public` endpoint can be accessed anonymously. -|`/api/users/me`|The `/api/admin` endpoint is protected with role-based access control (RBAC), and only users who have been granted the `admin` role can access it. +|`/api/admin`| The `/api/admin` endpoint is protected with role-based access control (RBAC), and only users who have been granted the `admin` role can access it. At this endpoint, the `@RolesAllowed` annotation is used to declaratively enforce the access constraint. -| `/api/admin`| The `/api/users/me` endpoint is protected with RBAC and only users that have been granted the `user` role can access it. A JSON document with details about the user is returned as a response. +|`/api/users/me`| The `/api/users/me` endpoint is protected with RBAC and only users that have been granted the `user` role can access it. A JSON document with details about the user is returned as a response. |=== [TIP]