Skip to content

Commit 48ef6a2

Browse files
authored
Merge pull request #88 from SeeClickFix/zb/authentication-cleanup
[TP-187377] Misc. Authentication fixes
2 parents 2102d41 + 8c5ed4b commit 48ef6a2

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

content/v2/overview/authentication.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ SeeClickFix currently supports the following authentication methods for access t
99
1. Token Authentication
1010
1. OAauth2 Authentication
1111

12-
### Token Authentication
12+
## Token Authentication
1313
This method is appropriate for API access. It is a secret that is included as a request header.
1414

1515
Header Format:
@@ -24,7 +24,7 @@ $ curl -i https://seeclickfix.com/api/v2/profile -H "Authorization: Bearer test-
2424
</pre>
2525

2626

27-
### OAuth2 Authentication
27+
## OAuth2 Authentication
2828

2929
This method is appropriate when the client application is being used by multiple users
3030
and the user's credentials should not be shared with the client directly.
@@ -53,17 +53,17 @@ With the client id, authentication and API access can proceed as follows using a
5353

5454
1. Client Application initiates browser access to SCF authentication endpoint
5555

56-
<pre class="terminal">
57-
https://seeclickfix.com/oauth/authorize?client_id=YOUR_CLIENT_ID&redirect_uri=YOUR_REDIRECT_URI&response_type=token
58-
</pre>
56+
<pre class="terminal">
57+
https://seeclickfix.com/oauth/authorize?client_id=YOUR_CLIENT_ID&redirect_uri=YOUR_REDIRECT_URI&response_type=token
58+
</pre>
5959

6060
2. SCF user enters SCF credentials and on success is redirected to Client Application Redirect URI which will include an access_token
6161

6262
3. Client Application can now make API requests on behalf of the user, by including user's access token. See [RFC 6750](http://tools.ietf.org/html/rfc6750#section-2.1) for options and detail for transmitting the access token to the API endpoints. One method is to send the access_token in the `Authentication` header:
6363

64-
<pre class="terminal">
65-
Authentication: Bearer xxxxxxxxxxxxxxxxxxxx
66-
</pre>
64+
<pre class="terminal">
65+
Authentication: Bearer xxxxxxxxxxxxxxxxxxxx
66+
</pre>
6767

6868
For more details see this [overview](https://auth0.com/docs/flows/concepts/implicit) of the implicit flow [RFC 6749, section 4.2](https://tools.ietf.org/html/rfc6749#section-4.2)
6969

0 commit comments

Comments
 (0)