michaeljmarshall commented on code in PR #558:
URL: https://github.com/apache/pulsar-site/pull/558#discussion_r1188123061


##########
docs/security-openid-connect.md:
##########
@@ -21,9 +25,9 @@ After authenticating with the Identity Provider, the Pulsar 
client gets an acces
 7. When token validation is successful, the Pulsar Server extracts the `sub` 
claim from the token (or the configured `openIDRoleClaim`) and uses it as the 
principal for authorization.
 8. When the token expires, the Pulsar Server challenges the client to 
re-authenticate with the Identity Provider and provide a new access token. If 
the client fails to re-authenticate, the Pulsar Server closes the connection.
 
-## Enable OpenID Connect Authentication in the Brokers, Proxies, and WebSocket 
Proxies
+## Enable OpenID Connect Authentication in the Broker and Proxy
 
-To configure Pulsar Servers to authenticate clients using OpenID Connect, add 
the following parameters to the `conf/broker.conf`, the `conf/proxy.conf`, and 
the `conf/websocket.conf` files. If you use a standalone Pulsar, you need to 
add these parameters to the `conf/standalone.conf` file:
+To configure Pulsar Servers to authenticate clients using OpenID Connect, add 
the following parameters to the `conf/broker.conf` and the `conf/proxy.conf`. 
If you use a standalone Pulsar, you need to add these parameters to the 
`conf/standalone.conf` file:

Review Comment:
   Do we capitalize broker and proxy in this context? I think I am going to 
replace server with broker and proxy.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to