Skip to content

Commit a70e7da

Browse files
Okta-566837 Capitalisation corrections for b words (#4033)
* Misc spelling and capitalization corrections "b" * Change base64 > Base64 * base64 encoded > Base64-encoded * base64URL encoded > Base64URL-encoded * Update Base URL > base URL, Base URI > base URI * basic authentication > Basic Authentication
1 parent 4775157 commit a70e7da

File tree

23 files changed

+36
-36
lines changed

23 files changed

+36
-36
lines changed

packages/@okta/vuepress-site/code/android/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This method works with both Okta Identity Engine and Okta Classic Engine.
3636

3737
SDK: [Okta Mobile SDK for Kotlin](https://github.com/okta/okta-mobile-kotlin).
3838

39-
Example: [Browser Sign In](https://github.com/okta/samples-android/tree/master/browser-sign-in).
39+
Example: [Browser sign-in](https://github.com/okta/samples-android/tree/master/browser-sign-in).
4040

4141

4242
### Use the embedded model

packages/@okta/vuepress-site/code/ios/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This method works with both Okta Identity Engine and Okta Classic Engine.
3535

3636
SDK: [Okta Mobile SDK for Swift](https://github.com/okta/okta-mobile-swift).
3737

38-
Example: [Browser sign in](https://github.com/okta/samples-ios/tree/master/browser-sign-in).
38+
Example: [Browser sign-in](https://github.com/okta/samples-ios/tree/master/browser-sign-in).
3939

4040

4141
### Use the embedded model

packages/@okta/vuepress-site/code/react-native/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ These SDKs help you integrate with Okta by redirecting to the Okta Sign-In Widge
2828

2929
* [okta-react-native on npm](https://www.npmjs.com/package/@okta/okta-react-native)
3030
* [React Native SDK Source](https://github.com/okta/okta-react-native)
31-
* [React Native redirect authentication sample app](https://github.com/okta/samples-js-react-native): See [Browser Sign In](https://github.com/okta/samples-js-react-native/tree/master/browser-sign-in) for a redirect configuration.
31+
* [React Native redirect authentication sample app](https://github.com/okta/samples-js-react-native): See [Browser sign-in](https://github.com/okta/samples-js-react-native/tree/master/browser-sign-in) for a redirect configuration.
3232

3333
## Recommended guides
3434

packages/@okta/vuepress-site/docs/concepts/oauth-openid/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ For information on how to set up your application to use this flow, see [Impleme
264264

265265
The SAML 2.0 Assertion flow is intended for a client app that wants to use an existing trust relationship without a direct user approval step at the authorization server. It enables a client application to obtain an authorization from a valid, signed SAML assertion from the SAML Identity Provider. The client app can then exchange it for an OAuth access token from the OAuth authorization server. For example, this flow is useful when you want to fetch data from APIs that only support delegated permissions without prompting the user for credentials.
266266

267-
To use a SAML 2.0 Assertion as an authorization grant, the client makes a SAML request to the Identity Provider and the Identity Provider sends the SAML 2.0 Assertion back in the response. The client then makes a request for an access token with the `urn:ietf:params:oauth:grant-type:saml2-bearer` grant type and includes the `assertion` parameter. The value of the `assertion` parameter is the SAML 2.0 assertion that is Base64 encoded. You can send only one SAML assertion in that request.
267+
To use a SAML 2.0 Assertion as an authorization grant, the client makes a SAML request to the Identity Provider and the Identity Provider sends the SAML 2.0 Assertion back in the response. The client then makes a request for an access token with the `urn:ietf:params:oauth:grant-type:saml2-bearer` grant type and includes the `assertion` parameter. The value of the `assertion` parameter is the SAML 2.0 assertion that is Base64-encoded. You can send only one SAML assertion in that request.
268268

269269
<div class="full">
270270

packages/@okta/vuepress-site/docs/guides/authenticators-google-authenticator/main/nodeexpress/enrollmentintegrationsteps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ When the user selects and submits Google Authenticator, call `OktaAuth.idx.proce
6363

6464
### 4: Display shared secret and QR Code
6565

66-
Next, display the shared secret to the user so they can copy the value to the Google Authenticator app. The response from `OktaAuth.idx.proceed()` allows you to display a string and QR code that contains the shared secret. `IdxTransaction` is returned with `authenticator.contextualData.sharedsecret` set to a string of the secret and `authenticator.contextualData.qrcode.href` stores the secret in a base64-encoded PNG image. See the following `IdxTransaction` example.
66+
Next, display the shared secret to the user so they can copy the value to the Google Authenticator app. The response from `OktaAuth.idx.proceed()` allows you to display a string and QR code that contains the shared secret. `IdxTransaction` is returned with `authenticator.contextualData.sharedsecret` set to a string of the secret and `authenticator.contextualData.qrcode.href` stores the secret in a Base64-encoded PNG image. See the following `IdxTransaction` example.
6767

6868
``` json
6969
{

packages/@okta/vuepress-site/docs/guides/authenticators-okta-verify/main/java/enrollmentqrcodeintegrationsteps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ case AWAITING_AUTHENTICATOR_ENROLLMENT_SELECTION:
1515

1616
#### 3: Display QR code and start polling
1717

18-
When the user selects to enroll the Okta Verify `Authenticator` the form posts back to the `idxAuthenticationWrapper.selectAuthenticator()` method. This will trigger an `AWAITING_POLL_ENROLLMENT` state. The state's `ContextualData` object contains a base64 encoded QR code image for display to the user.
18+
When the user selects to enroll the Okta Verify `Authenticator` the form posts back to the `idxAuthenticationWrapper.selectAuthenticator()` method. This will trigger an `AWAITING_POLL_ENROLLMENT` state. The state's `ContextualData` object contains a Base64-encoded QR code image for display to the user.
1919

2020
```java
2121
case AWAITING_POLL_ENROLLMENT:

packages/@okta/vuepress-site/docs/guides/authenticators-okta-verify/main/nodeexpress/enrollmentqrcodeintegrationsteps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following table describes the most important `IdxTransaction` properties for
4343
|----------------|---------------------------------------------------|---------------------------------------------------|
4444
| `IdxTransaction.status` | `PENDING` | Status of transaction. A value of `PENDING` indicates that Okta is waiting for the user to complete the Okta Verify setup.|
4545
| `IdxTransaction.nextStep.name` | `enroll-poll` | Name of the next step in the sign-in flow. A value of `enroll-poll` indicates that the app should show the QR Code and poll Okta to determine when the user completes the Okta Verify setup. |
46-
| `IdxTransaction.nextStep.authenticator.contextualData.qrcode.href` | "data:image/png;base64,..." | The QR code base64 encoded PNG image.
46+
| `IdxTransaction.nextStep.authenticator.contextualData.qrcode.href` | "data:image/png;base64,..." | The QR code Base64-encoded PNG image.
4747

4848
A `IdxTransaction.status` value of `PENDING` and `IdxTransaction.nextStep.name` value of `enroll-poll` signifies that Okta is waiting for the user to add their account to Okta Verify. At this time, your app should start polling to determine when the user completes the Okta Verify account setup.
4949

packages/@okta/vuepress-site/docs/guides/common-hook-set-up-steps/main/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Start with a new Node.js project built on the Express framework or a Node.js SQL
4646

4747
The Glitch project templates don't have any body-parsing code. To include this content:
4848

49-
* Add the Body Parser `npm` package to your Glitch project
49+
* Add the body-parser `npm` package to your Glitch project
5050
* Add the code snippet below
5151

5252
If you remix a Glitch inline hook project, the packages and code are already included.
@@ -63,7 +63,7 @@ To add the `npm` packages:
6363
6464
## Add authentication method
6565

66-
Okta inline hooks can use header authentication as well as OAuth 2.0 authentication to secure the calls from Okta to your external service. The inline hook Glitch projects use basic authentication. See the following sections to implement basic authentication or to use the OAuth 2.0 client secret or the private key method.
66+
Okta inline hooks can use header authentication as well as OAuth 2.0 authentication to secure the calls from Okta to your external service. The inline hook Glitch projects use Basic Authentication. See the following sections to implement Basic Authentication or to use the OAuth 2.0 client secret or the private key method.
6767

6868
### HTTP header: Basic Authentication
6969

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
```javascript
22

3-
// Body Parsing
3+
// Body parsing
44
const bodyParser = require('body-parser');
55
app.use(bodyParser.json());

packages/@okta/vuepress-site/docs/guides/embedded-siw/main/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -391,11 +391,11 @@ See the following:
391391
392392
* Android:
393393
* [Sign users in to your Android mobile app using the redirect model](/docs/guides/sign-into-mobile-app-redirect/android/main/)
394-
* [Browser Sign In](https://github.com/okta/samples-android/tree/master/browser-sign-in)
394+
* [Browser sign-in](https://github.com/okta/samples-android/tree/master/browser-sign-in)
395395
* [Okta Mobile SDK for Kotlin](https://github.com/okta/okta-mobile-kotlin)
396396
* iOS:
397397
* [Sign users in to your iOS mobile app using the redirect model](/docs/guides/sign-into-mobile-app-redirect/ios/main/)
398-
* [Browser Sign In](https://github.com/okta/samples-ios/tree/master/browser-sign-in)
398+
* [Browser sign-in](https://github.com/okta/samples-ios/tree/master/browser-sign-in)
399399
* [Okta Mobile SDK for Swift](https://github.com/okta/okta-mobile-swift)
400400
401401
You can also develop your mobile app with frameworks like Ionic and Flutter. We currently don't have native SDKs for either, but they should work with an AppAuth library. We recommend [Ionic AppAuth](https://github.com/wi3land/ionic-appauth) and the [Flutter AppAuth Plugin](https://pub.dev/packages/flutter_appauth).

0 commit comments

Comments
 (0)