Author: jawi
Date: Tue Nov 25 11:01:07 2014
New Revision: 1641566

URL: http://svn.apache.org/r1641566
Log:
Minor layout improvement.

Modified:
    ace/site/trunk/content/docs/using-basic-auth.mdtext

Modified: ace/site/trunk/content/docs/using-basic-auth.mdtext
URL: 
http://svn.apache.org/viewvc/ace/site/trunk/content/docs/using-basic-auth.mdtext?rev=1641566&r1=1641565&r2=1641566&view=diff
==============================================================================
--- ace/site/trunk/content/docs/using-basic-auth.mdtext (original)
+++ ace/site/trunk/content/docs/using-basic-auth.mdtext Tue Nov 25 11:01:07 2014
@@ -1,9 +1,5 @@
 Title: ACE Authentication
 
-[TOC]
-
-## Introduction
-
 When provisioning software (partly) to targets, one has to rely upon the 
trustworthiness
 of both the network and the target. Even if everything is under your control 
and
 governance, one cannot entirely be sure that unwanted access takes place. A 
first step in
@@ -12,10 +8,13 @@ verify the identity of someone. Once the
 in order to determine what actions are allowed and which are not.  In this 
article, the
 recently added authentication layer of ACE is explained in more depth and how 
to configure
 authentication to your situation.
+
 More details on the design of the authentication mechanism in ACE can be found 
in the
 [design documentation](/docs/design/authentication-design.mdtext).
 
 
+[TOC]
+
 ## Configuring authentication
 
 By default, ACE has no form of authentication enabled. While this is 
sufficient for


Reply via email to