diff --git a/docs/manual/src/docbook/cas-auth-provider.xml b/docs/manual/src/docbook/cas-auth-provider.xml index c576aa5019..400a77a6bd 100644 --- a/docs/manual/src/docbook/cas-auth-provider.xml +++ b/docs/manual/src/docbook/cas-auth-provider.xml @@ -292,7 +292,7 @@ The CasAuthenticationEntryPoint should be selected to drive - authentication using entry-point-ref. The CasAuthenticationFilter has very similar properties to the UsernamePasswordAuthenticationFilter (used for form-based logins). diff --git a/docs/manual/src/docbook/core-services.xml b/docs/manual/src/docbook/core-services.xml index 29cd586e6b..03e2bffcca 100644 --- a/docs/manual/src/docbook/core-services.xml +++ b/docs/manual/src/docbook/core-services.xml @@ -97,7 +97,7 @@ SaltSource enables the passwords to be populated with a "salt", which enhances the security of the passwords in the authentication repository. These will be discussed in more detail below. + xlink:href="#core-services-password-encoding">below.
Erasing Credentials on Successful Authentication diff --git a/docs/manual/src/docbook/namespace-config.xml b/docs/manual/src/docbook/namespace-config.xml index 8ad6f8602e..0c8037576f 100644 --- a/docs/manual/src/docbook/namespace-config.xml +++ b/docs/manual/src/docbook/namespace-config.xml @@ -518,7 +518,7 @@ List<OpenIDAttribute> attributes = token.getAttributes();The OpenIDAttribute contains the attribute type and the retrieved value (or values in the case of multi-valued attributes). We'll see more about how the SecurityContextHolder class is used when we look at core Spring - Security components in the technical overview + Security components in the technical overview chapter.
@@ -624,7 +624,7 @@ List<OpenIDAttribute> attributes = token.getAttributes();The From version 2.0 onwards Spring Security has improved support substantially for adding security to your service layer methods. It provides support for JSR-250 annotation security as well as the framework's original @Secured annotation. From 3.0 you can also - make use of new expression-based annotations. You can + make use of new expression-based annotations. You can apply security to a single bean, using the intercept-methods element to decorate the bean declaration, or you can secure multiple beans across the entire service layer using the AspectJ style pointcuts. diff --git a/docs/manual/src/docbook/preauth.xml b/docs/manual/src/docbook/preauth.xml index 959c778d03..a7fb9d61c9 100644 --- a/docs/manual/src/docbook/preauth.xml +++ b/docs/manual/src/docbook/preauth.xml @@ -166,7 +166,7 @@ class="org.springframework.security.web.authentication.preauth.PreAuthenticatedA configuration (hence the user of the custom-filter, authentication-manager and custom-authentication-provider elements (you can read more about them - in the namespace chapter). You would leave these out + in the namespace chapter). You would leave these out of a traditional bean configuration. It's also assumed that you have added a UserDetailsService (called userDetailsService) to your configuration to load the user's roles. diff --git a/docs/manual/src/docbook/samples.xml b/docs/manual/src/docbook/samples.xml index de0ce1d326..e29bcb103d 100644 --- a/docs/manual/src/docbook/samples.xml +++ b/docs/manual/src/docbook/samples.xml @@ -103,7 +103,7 @@ Success! Your web filters appear to be properly configured! CAS Sample The CAS sample requires that you run both a CAS server and CAS client. It isn't included in the distribution so you should check out the project code as described in - the introduction. You'll find the relevant + the introduction. You'll find the relevant files under the sample/cas directory. There's also a Readme.txt file in there which explains how to run both the server and the client directly from the source tree, complete with SSL support. You have diff --git a/docs/manual/src/docbook/taglibs.xml b/docs/manual/src/docbook/taglibs.xml index c85bb759b1..f3544b4dd1 100644 --- a/docs/manual/src/docbook/taglibs.xml +++ b/docs/manual/src/docbook/taglibs.xml @@ -16,7 +16,7 @@ Spring Security 3.0, it can be used in two ways The legacy options from Spring Security 2.0 are also supported, but discouraged. - . The first approach uses a web-security + . The first approach uses a web-security expression, specified in the access attribute of the tag. The expression evaluation will be delegated to the WebSecurityExpressionHandler defined in the diff --git a/docs/manual/src/docbook/technical-overview.xml b/docs/manual/src/docbook/technical-overview.xml index 0b733fcf5f..d9136cc2d4 100644 --- a/docs/manual/src/docbook/technical-overview.xml +++ b/docs/manual/src/docbook/technical-overview.xml @@ -521,7 +521,7 @@ Successfully authenticated. Security context contains: \ and should be consumed by Spring Security's RoleVoter. This is only relevant when a voter-based AccessDecisionManager is in use. We'll see how the AccessDecisionManager is implemented - in the authorization chapter. + in the authorization chapter.
RunAsManager