Skip to content

Commit 5513f11

Browse files
committed
Copy-edit
Minor grammar and style edits.
1 parent 7cba4a5 commit 5513f11

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

docs/tutorial/tutorial_01.rst

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You want to make your own :term:`Authorization Server` to issue access tokens to
88
Start Your App
99
--------------
1010
During this tutorial you will make an XHR POST from a Heroku deployed app to your localhost instance.
11-
Since the domain that will originate the request (the app on Heroku) is different than the destination domain (your local instance),
11+
Since the domain that will originate the request (the app on Heroku) is different from the destination domain (your local instance),
1212
you will need to install the `django-cors-headers <https://github.com/ottoyiu/django-cors-headers>`_ app.
1313
These "cross-domain" requests are by default forbidden by web browsers unless you use `CORS <http://en.wikipedia.org/wiki/Cross-origin_resource_sharing>`_.
1414

@@ -67,7 +67,7 @@ for details on using login templates.
6767

6868
<input type="hidden" name="next" value="{{ next }}" />
6969

70-
As a final step, execute migrate command, start the internal server, and login with your credentials.
70+
As a final step, execute the migrate command, start the internal server, and login with your credentials.
7171

7272
Create an OAuth2 Client Application
7373
-----------------------------------
@@ -78,11 +78,11 @@ the API, subject to approval by its users.
7878
Let's register your application.
7979

8080
Point your browser to http://localhost:8000/o/applications/ and add an Application instance.
81-
`Client id` and `Client Secret` are automatically generated, you have to provide the rest of the informations:
81+
`Client id` and `Client Secret` are automatically generated; you have to provide the rest of the informations:
8282

8383
* `User`: the owner of the Application (e.g. a developer, or the currently logged in user.)
8484

85-
* `Redirect uris`: Applications must register at least one redirection endpoint prior to utilizing the
85+
* `Redirect uris`: Applications must register at least one redirection endpoint beofre using the
8686
authorization endpoint. The :term:`Authorization Server` will deliver the access token to the client only if the client
8787
specifies one of the verified redirection uris. For this tutorial, paste verbatim the value
8888
`http://django-oauth-toolkit.herokuapp.com/consumer/exchange/`
@@ -117,9 +117,9 @@ Authorize the Application
117117
+++++++++++++++++++++++++
118118
When a user clicks the link, she is redirected to your (possibly local) :term:`Authorization Server`.
119119
If you're not logged in, you will be prompted for username and password. This is because the authorization
120-
page is login protected by django-oauth-toolkit. Login, then you should see the (not so cute) form users can use to give
120+
page is login protected by django-oauth-toolkit. Login, then you should see the (not so cute) form a user can use to give
121121
her authorization to the client application. Flag the *Allow* checkbox and click *Authorize*, you will be redirected
122-
again on to the consumer service.
122+
again to the consumer service.
123123

124124
__ loginTemplate_
125125

@@ -140,9 +140,9 @@ Refresh the token
140140
+++++++++++++++++
141141
The page showing the access token retrieved from the :term:`Authorization Server` also let you make a POST request to
142142
the server itself to swap the refresh token for another, brand new access token.
143-
Just fill in the missing form fields and click the Refresh button: if everything goes smooth you will see the access and
143+
Just fill in the missing form fields and click the Refresh button: if everything goes smoothly you will see the access and
144144
refresh token change their values, otherwise you will likely see an error message.
145-
When finished playing with your authorization server, take note of both the access and refresh tokens, we will use them
145+
When you have finished playing with your authorization server, take note of both the access and refresh tokens, we will use them
146146
for the next part of the tutorial.
147147

148148
So let's make an API and protect it with your OAuth2 tokens in the :doc:`part 2 of the tutorial <tutorial_02>`.

0 commit comments

Comments
 (0)