Skip to content

Commit

Permalink
Fix various typo's (IdentityServer#4135)
Browse files Browse the repository at this point in the history
* fix a few typos

* fix typo in contributing.md file
  • Loading branch information
Icidis authored Mar 3, 2020
1 parent 5e7f7f4 commit 3afba78
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion .github/CONTRIBUTING.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ Then we can decide if and how a feature or a change could be implemented and if

Also read this first: [Being a good open source citizen](https://hackernoon.com/being-a-good-open-source-citizen-9060d0ab9732#.x3hocgw85)

## Found and issue or a bug?
## Found an issue or a bug?
Please start a discussion on the [core repo issue tracker](https://github.com/IdentityServer/IdentityServer4/issues).

## Filing issues
Expand Down
2 changes: 1 addition & 1 deletion docs/reference/client.rst
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ Token
``AlwaysSendClientClaims``
If set, the client claims will be sent for every flow. If not, only for client credentials flow (default is `false`)
``AlwaysIncludeUserClaimsInIdToken``
When requesting both an id token and access token, should the user claims always be added to the id token instead of requring the client to use the userinfo endpoint. Default is `false`.
When requesting both an id token and access token, should the user claims always be added to the id token instead of requiring the client to use the userinfo endpoint. Default is `false`.
``ClientClaimsPrefix``
If set, the prefix client claim types will be prefixed with. Defaults to `client_`. The intent is to make sure they don't accidentally collide with user claims.
``PairWiseSubjectSalt``
Expand Down
2 changes: 1 addition & 1 deletion docs/reference/options.rst
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ The ``CustomEntries`` dictionary allows adding custom elements to the discovery
Authentication
^^^^^^^^^^^^^^
* ``CookieAuthenticationScheme``
Sets the cookie authentication scheme confgured by the host used for interactive users. If not set, the scheme will be inferred from the host's default authentication scheme. This setting is typically used when AddPolicyScheme is used in the host as the default scheme.
Sets the cookie authentication scheme configured by the host used for interactive users. If not set, the scheme will be inferred from the host's default authentication scheme. This setting is typically used when AddPolicyScheme is used in the host as the default scheme.

* ``CookieLifetime``
The authentication cookie lifetime (only effective if the IdentityServer-provided cookie handler is used).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ namespace IdentityServer4.Configuration
public class AuthenticationOptions
{
/// <summary>
/// Sets the cookie authenitcation scheme confgured by the host used for interactive users. If not set, the scheme will inferred from the host's default authentication scheme.
/// Sets the cookie authentication scheme configured by the host used for interactive users. If not set, the scheme will inferred from the host's default authentication scheme.
/// This setting is typically used when AddPolicyScheme is used in the host as the default scheme.
/// </summary>
public string CookieAuthenticationScheme { get; set; }
Expand Down
2 changes: 1 addition & 1 deletion src/Storage/src/Models/Client.cs
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ public ICollection<string> AllowedGrantTypes
public ICollection<string> AllowedScopes { get; set; } = new HashSet<string>();

/// <summary>
/// When requesting both an id token and access token, should the user claims always be added to the id token instead of requring the client to use the userinfo endpoint.
/// When requesting both an id token and access token, should the user claims always be added to the id token instead of requiring the client to use the userinfo endpoint.
/// Defaults to <c>false</c>.
/// </summary>
public bool AlwaysIncludeUserClaimsInIdToken { get; set; } = false;
Expand Down

0 comments on commit 3afba78

Please sign in to comment.