Skip to content

Commit b9105c6

Browse files
authored
Merge pull request #86 from francoisfreitag/readme-cosmetic
Cosmetic edits to the README
2 parents cdbbc81 + e80bfb1 commit b9105c6

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

README.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ We will see a typical configuration for protecting a Django project::
226226
# Signing
227227
'key_file': path.join(BASEDIR, 'mycert.key'), # private part
228228
'cert_file': path.join(BASEDIR, 'mycert.pem'), # public part
229-
229+
230230
# Encryption
231231
'encryption_keypairs': [{
232232
'key_file': path.join(BASEDIR, 'my_encryption_key.key'), # private part
@@ -282,7 +282,7 @@ entities metadata. This XML file should be in the SAML2 metadata format.
282282
The ``key_file`` and ``cert_file`` options reference the two parts of a
283283
standard x509 certificate. You need it to sign your metadata. For assertion
284284
encryption/decryption support please configure another set of ``key_file`` and
285-
``cert_file``, but as inner attribues of ``encryption_keypairs`` option.
285+
``cert_file``, but as inner attributes of ``encryption_keypairs`` option.
286286

287287
.. note::
288288

@@ -310,7 +310,7 @@ User attributes
310310
---------------
311311

312312
In the SAML 2.0 authentication process the Identity Provider (IdP) will
313-
send a security assertion to the Service Provider (SP) upon a succesful
313+
send a security assertion to the Service Provider (SP) upon a successful
314314
authentication. This assertion contains attributes about the user that
315315
was authenticated. It depends on the IdP configuration what exact
316316
attributes are sent to each SP it can talk to.
@@ -328,7 +328,7 @@ Please, use an unique attribute when setting this option. Otherwise
328328
the authentication process may fail because djangosaml2 will not know
329329
which Django user it should pick.
330330

331-
If your main attribute is something inherently case-inensitive (such as
331+
If your main attribute is something inherently case-insensitive (such as
332332
an email address), you may set::
333333

334334
SAML_DJANGO_USER_MAIN_ATTRIBUTE_LOOKUP = '__iexact'
@@ -376,7 +376,7 @@ If you are using Django user profile objects to store extra attributes
376376
about your user you can add those attributes to the SAML_ATTRIBUTE_MAPPING
377377
dictionary. For each (key, value) pair, djangosaml2 will try to store the
378378
attribute in the User model if there is a matching field in that model.
379-
Otherwise it will try to do the same with your profile custom model. For
379+
Otherwise it will try to do the same with your profile custom model. For
380380
multi-valued attributes only the first value is assigned to the destination field.
381381

382382
Alternatively, custom processing of attributes can be achieved by setting the
@@ -403,7 +403,7 @@ Custom User object::
403403
class User(AbstractUser):
404404

405405
def process_groups(self, groups):
406-
// process list of group names in argument 'groups'
406+
// process list of group names in argument 'groups'
407407
pass;
408408

409409
settings.py::

0 commit comments

Comments
 (0)