You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ace.apache.org by ja...@apache.org on 2014/11/25 12:01:07 UTC

svn commit: r1641566 - /ace/site/trunk/content/docs/using-basic-auth.mdtext

Author: jawi
Date: Tue Nov 25 11:01:07 2014
New Revision: 1641566

URL: http://svn.apache.org/r1641566
Log:
Minor layout improvement.

Modified:
    ace/site/trunk/content/docs/using-basic-auth.mdtext

Modified: ace/site/trunk/content/docs/using-basic-auth.mdtext
URL: http://svn.apache.org/viewvc/ace/site/trunk/content/docs/using-basic-auth.mdtext?rev=1641566&r1=1641565&r2=1641566&view=diff
==============================================================================
--- ace/site/trunk/content/docs/using-basic-auth.mdtext (original)
+++ ace/site/trunk/content/docs/using-basic-auth.mdtext Tue Nov 25 11:01:07 2014
@@ -1,9 +1,5 @@
 Title: ACE Authentication
 
-[TOC]
-
-## Introduction
-
 When provisioning software (partly) to targets, one has to rely upon the trustworthiness
 of both the network and the target. Even if everything is under your control and
 governance, one cannot entirely be sure that unwanted access takes place. A first step in
@@ -12,10 +8,13 @@ verify the identity of someone. Once the
 in order to determine what actions are allowed and which are not.  In this article, the
 recently added authentication layer of ACE is explained in more depth and how to configure
 authentication to your situation.
+
 More details on the design of the authentication mechanism in ACE can be found in the
 [design documentation](/docs/design/authentication-design.mdtext).
 
 
+[TOC]
+
 ## Configuring authentication
 
 By default, ACE has no form of authentication enabled. While this is sufficient for