Skip to content

Commit e8d0d58

Browse files
m-mohrsoxofaan
andauthored
Apply suggestions from code review
Co-authored-by: Stefaan Lippens <[email protected]>
1 parent 76d11e1 commit e8d0d58

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

openapi.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6802,7 +6802,7 @@ components:
68026802
The Bearer token is an access token in [JWT](https://datatracker.ietf.org/doc/html/rfc7519) format
68036803
as defined in RFC 7519. For openEO, it MUST include the issuer in the
68046804
`iss` claim although being optional in RFC 7519.
6805-
If the concept of an issuer doesn not exist in an authentication method (e.g. in HTTP Basic),
6805+
If the concept of an issuer does not exist in an authentication method (e.g. in HTTP Basic),
68066806
implementations could use the endpoint for Basic Authentication as the issuer, for example.
68076807
68086808
openEO backend implementations MUST signal their support for JWT by listing the given
@@ -6824,12 +6824,12 @@ components:
68246824
For OpenID Connect, the provider ID corresponds to the value
68256825
specified for `id` for each provider in `GET /credentials/oidc`.
68266826
6827-
All servers must accept this method for backward compatibility
6827+
All openEO backends MUST accept this method for backward compatibility
68286828
until version 2.0 of the specification.
68296829
68306830
The access tokens provided by the identity provider do not include
68316831
the prefix that includes the authentication method and provider ID.
6832-
The Bearer Token sent to the server MUST have the prefix, e.g. `basic//` for Basic authentication.
6832+
The Bearer Token sent to the openEO backend MUST have the prefix, e.g. `basic//` for Basic authentication.
68336833
This means that the clients have to prepend the prefix.
68346834
68356835
JWT and openEO tokens can be distinguished by the presence of a slash

0 commit comments

Comments
 (0)