Skip to content

Commit db205ce

Browse files
committed
Removing '-shortenings which tend to be considered spoken language and
might add complexity to the comprehend for the reader.
1 parent 3a43c59 commit db205ce

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

README

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ In addition to the main `webauthn-server-core` module, there are also:
8686
=== Non-features
8787

8888
This library has no concept of accounts, sessions, permissions or identity
89-
federation, and it's not an authentication framework; it only deals with
89+
federation, and it is not an authentication framework; it only deals with
9090
executing the WebAuthn authentication mechanism. Sessions, account management
9191
and other higher level concepts can make use of this authentication mechanism,
9292
but the authentication mechanism alone does not make a security system.
@@ -115,7 +115,7 @@ The client side involves:
115115
1. Call `navigator.credentials.create()` or `.get()`,
116116
passing the result from `RelyingParty.startRegistration(...)` or `.startAssertion(...)` as the argument.
117117
2. Encode the result of the successfully resolved promise and return it to the server.
118-
For this you'll need some way to encode `Uint8Array` values;
118+
For this you need some way to encode `Uint8Array` values;
119119
this guide will assume use of link:https://github.com/beatgammit/base64-js[base64-js].
120120
However the built-in parser methods for
121121
link:https://developers.yubico.com/java-webauthn-server/JavaDoc/webauthn-server-core/latest/com/yubico/webauthn/data/PublicKeyCredential.html[`PublicKeyCredential`]
@@ -195,7 +195,7 @@ String credentialCreateJson = request.toCredentialsCreateJson();
195195
return credentialCreateJson; // Send to client
196196
----------
197197

198-
You'll need to keep this `PublicKeyCredentialCreationOptions` object in temporary storage
198+
You need to keep this `PublicKeyCredentialCreationOptions` object in temporary storage
199199
so you can also pass it into `finishRegistration(...)` later.
200200

201201
Now call the WebAuthn API on the client side:
@@ -271,7 +271,7 @@ try {
271271
----------
272272

273273
Finally, if the previous step was successful, store the new credential in your database.
274-
Here's an example of things you'll likely want to store:
274+
Here is an example of things you will likely want to store:
275275

276276
[source,java]
277277
----------
@@ -313,7 +313,7 @@ String credentialGetJson = request.toCredentialsGetJson();
313313
return credentialGetJson; // Send to client
314314
----------
315315

316-
Again, you'll need to keep this `PublicKeyCredentialRequestOptions` object in temporary storage
316+
Again, you need to keep this `PublicKeyCredentialRequestOptions` object in temporary storage
317317
so you can also pass it into `finishAssertion(...)` later.
318318

319319
Now call the WebAuthn API on the client side:

0 commit comments

Comments
 (0)