This is an automated email from the ASF dual-hosted git repository.

duanzhengqiang pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/shardingsphere.git


The following commit(s) were added to refs/heads/master by this push:
     new e009ca59fed Update authority.en.md (#24658)
e009ca59fed is described below

commit e009ca59fed716ed9a2f8243f45f837f4551cd3d
Author: Yacine Si Tayeb <[email protected]>
AuthorDate: Fri Mar 17 11:39:09 2023 +0800

    Update authority.en.md (#24658)
---
 .../shardingsphere-proxy/yaml-config/authority.en.md | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git 
a/docs/document/content/user-manual/shardingsphere-proxy/yaml-config/authority.en.md
 
b/docs/document/content/user-manual/shardingsphere-proxy/yaml-config/authority.en.md
index 61714100ed8..e18dab8a4d4 100644
--- 
a/docs/document/content/user-manual/shardingsphere-proxy/yaml-config/authority.en.md
+++ 
b/docs/document/content/user-manual/shardingsphere-proxy/yaml-config/authority.en.md
@@ -9,12 +9,12 @@ In ShardingSphere-Proxy, user authentication and 
authorization information is co
 
 Thanks to ShardingSphere's pluggable architecture, Proxy provides two levels 
of privilege providers, namely: 
 
-- `ALL_PERMITTED`: each user has all privileges without special authorization;
-- `DATABASE_PERMITTED`: grant the user privileges on the specified logical 
databases, defined by `user-database-mappings`.
+- `ALL_PERMITTED`: each user has all privileges without special authorization.
+- `DATABASE_PERMITTED`: grants the user privileges on the specified logical 
databases, defined by `user-database-mappings`.
 
 The administrator can choose which privilege provider to use as needed when 
configuring `authority`. 
 
-## Parameter
+## Parameters
 
 ```yaml
 authority:
@@ -43,15 +43,15 @@ authority:
        password: sharding
 ```
 
-illustrate:
+Explanation:
 - Two users are defined: `root@%` and `sharding`;
 - `authenticationMethodName` is not specified for `[email protected]`, Proxy will 
automatically choose the authentication method according to the frontend 
protocol;
-- privilege provider is not specified, the default `ALL_PERMITTED` will be 
used;
+- Privilege provider is not specified, the default `ALL_PERMITTED` will be 
used;
 
 
 ### Authentication configuration
 
-Custom authentication configuration can meet the needs of users in some 
specific scenarios.
+The custom authentication configuration allows users to greater leeway to set 
their own custom configurations according to their scenarios. 
 Taking `openGauss` as the frontend protocol type as an example, its default 
authentication method is `scram-sha-256`.
 If the user `sharding` needs to use an old version of the psql client (which 
does not support `scram-sha-256`) to connect to the Proxy, the administrator 
may allow sharding to use the `md5` method for password authentication.
 The configuration is as follows:
@@ -71,7 +71,7 @@ authority:
      type: ALL_PERMITTED
 ```
 
-illustrate:
+Explanation:
 - Two users are defined: `[email protected]` and `sharding`;
 - Use `MD5` method for password authentication for `sharding`;
 - Authentication method is not specified for `[email protected]`, Proxy will 
automatically choose one according to the frontend protocol;
@@ -92,7 +92,7 @@ authority:
     type: ALL_PERMITTED
 ```
 
-illustrate:
+Explanation:
 - Two users are defined: `[email protected]` and `sharding`;
 - `authenticators` and `authenticationMethodName` are not defined, Proxy will 
automatically choose the authentication method according to the frontend 
protocol;
 - The privilege provider `ALL_PERMITTED` is specified.
@@ -112,11 +112,11 @@ authority:
       user-database-mappings: [email protected]=*, sharding=test_db, 
sharding=sharding_db
 ```
 
-illustrate:
+Explanation:
 - Two users are defined: `[email protected]` and `sharding`;
 - `authenticators` and `authenticationMethodName` are not defined, Proxy will 
automatically choose the authentication method according to the frontend 
protocol;
 - The privilege provider `DATABASE_PERMITTED` is specified, authorize 
`[email protected]` to access all logical databases (`*`), and user `sharding` can 
only access `test_db` and `sharding_db`.
 
 ## Related References
 
-Please refer to [Authority Provider](/en/dev-manual/proxy) for specific 
implementation of authority provider.
+Please refer to [Authority Provider](/en/dev-manual/proxy) for the specific 
implementation of authority provider.

Reply via email to