diff --git a/docs/manual/src/docbook/cas-auth-provider.xml b/docs/manual/src/docbook/cas-auth-provider.xml
index c576aa5019..400a77a6bd 100644
--- a/docs/manual/src/docbook/cas-auth-provider.xml
+++ b/docs/manual/src/docbook/cas-auth-provider.xml
@@ -292,7 +292,7 @@
The CasAuthenticationEntryPoint should be selected to drive
- authentication using entry-point-ref. The CasAuthenticationFilter has very similar properties to the
UsernamePasswordAuthenticationFilter (used for form-based logins).
diff --git a/docs/manual/src/docbook/core-services.xml b/docs/manual/src/docbook/core-services.xml
index 29cd586e6b..03e2bffcca 100644
--- a/docs/manual/src/docbook/core-services.xml
+++ b/docs/manual/src/docbook/core-services.xml
@@ -97,7 +97,7 @@
SaltSource enables the passwords to be populated
with a "salt", which enhances the security of the passwords in the authentication
repository. These will be discussed in more detail below.
+ xlink:href="#core-services-password-encoding">below.
Erasing Credentials on Successful Authentication
diff --git a/docs/manual/src/docbook/namespace-config.xml b/docs/manual/src/docbook/namespace-config.xml
index 8ad6f8602e..0c8037576f 100644
--- a/docs/manual/src/docbook/namespace-config.xml
+++ b/docs/manual/src/docbook/namespace-config.xml
@@ -518,7 +518,7 @@ List<OpenIDAttribute> attributes = token.getAttributes();The
OpenIDAttribute contains the attribute type and the retrieved
value (or values in the case of multi-valued attributes). We'll see more about how the
SecurityContextHolder class is used when we look at core Spring
- Security components in the technical overview
+ Security components in the technical overview
chapter.
@@ -624,7 +624,7 @@ List<OpenIDAttribute> attributes = token.getAttributes();The
From version 2.0 onwards Spring Security has improved support substantially for adding
security to your service layer methods. It provides support for JSR-250 annotation security as
well as the framework's original @Secured annotation. From 3.0 you can also
- make use of new expression-based annotations. You can
+ make use of new expression-based annotations. You can
apply security to a single bean, using the intercept-methods element to
decorate the bean declaration, or you can secure multiple beans across the entire service
layer using the AspectJ style pointcuts.
diff --git a/docs/manual/src/docbook/preauth.xml b/docs/manual/src/docbook/preauth.xml
index 959c778d03..a7fb9d61c9 100644
--- a/docs/manual/src/docbook/preauth.xml
+++ b/docs/manual/src/docbook/preauth.xml
@@ -166,7 +166,7 @@ class="org.springframework.security.web.authentication.preauth.PreAuthenticatedA
configuration (hence the user of the custom-filter,
authentication-manager and
custom-authentication-provider elements (you can read more about them
- in the namespace chapter). You would leave these out
+ in the namespace chapter). You would leave these out
of a traditional bean configuration. It's also assumed that you have added a
UserDetailsService (called
userDetailsService) to your configuration to load the user's roles.
diff --git a/docs/manual/src/docbook/samples.xml b/docs/manual/src/docbook/samples.xml
index de0ce1d326..e29bcb103d 100644
--- a/docs/manual/src/docbook/samples.xml
+++ b/docs/manual/src/docbook/samples.xml
@@ -103,7 +103,7 @@ Success! Your web filters appear to be properly configured!
CAS Sample The CAS sample requires that you run both a CAS server and CAS client. It isn't
included in the distribution so you should check out the project code as described in
- the introduction. You'll find the relevant
+ the introduction. You'll find the relevant
files under the sample/cas directory. There's also a
Readme.txt file in there which explains how to run both the
server and the client directly from the source tree, complete with SSL support. You have
diff --git a/docs/manual/src/docbook/taglibs.xml b/docs/manual/src/docbook/taglibs.xml
index c85bb759b1..f3544b4dd1 100644
--- a/docs/manual/src/docbook/taglibs.xml
+++ b/docs/manual/src/docbook/taglibs.xml
@@ -16,7 +16,7 @@
Spring Security 3.0, it can be used in two ways The legacy options from Spring Security 2.0 are also supported, but
discouraged.
- . The first approach uses a web-security
+ . The first approach uses a web-security
expression, specified in the access attribute of the tag.
The expression evaluation will be delegated to the
WebSecurityExpressionHandler defined in the
diff --git a/docs/manual/src/docbook/technical-overview.xml b/docs/manual/src/docbook/technical-overview.xml
index 0b733fcf5f..d9136cc2d4 100644
--- a/docs/manual/src/docbook/technical-overview.xml
+++ b/docs/manual/src/docbook/technical-overview.xml
@@ -521,7 +521,7 @@ Successfully authenticated. Security context contains: \
and should be consumed by Spring Security's RoleVoter. This is only
relevant when a voter-based AccessDecisionManager is in
use. We'll see how the AccessDecisionManager is implemented
- in the authorization chapter.
+ in the authorization chapter.
RunAsManager