Skip to content

Commit d0a5d5e

Browse files
authored
Fix broken link and formatting in documentation (#9848)
1 parent e221d9a commit d0a5d5e

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

docs/api-guide/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -451,7 +451,7 @@ More information can be found in the [Documentation](https://django-rest-durin.r
451451

452452
## django-pyoidc
453453

454-
[dango-pyoidc][django_pyoidc] adds support for OpenID Connect (OIDC) authentication. This allows you to delegate user management to an Identity Provider, which can be used to implement Single-Sign-On (SSO). It provides support for most uses-cases, such as customizing how token info are mapped to user models, using OIDC audiences for access control, etc.
454+
[django_pyoidc][django-pyoidc] adds support for OpenID Connect (OIDC) authentication. This allows you to delegate user management to an Identity Provider, which can be used to implement Single-Sign-On (SSO). It provides support for most uses-cases, such as customizing how token info are mapped to user models, using OIDC audiences for access control, etc.
455455

456456
More information can be found in the [Documentation](https://django-pyoidc.readthedocs.io/latest/index.html).
457457

docs/api-guide/throttling.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ Multiple throttles can also be used if you want to impose both burst throttling
1919

2020
Throttles do not necessarily only refer to rate-limiting requests. For example a storage service might also need to throttle against bandwidth, and a paid data service might want to throttle against a certain number of a records being accessed.
2121

22-
**The application-level throttling that REST framework provides should not be considered a security measure or protection against brute forcing or denial-of-service attacks. Deliberately malicious actors will always be able to spoof IP origins. In addition to this, the built-in throttling implementations are implemented using Django's cache framework, and use non-atomic operations to determine the request rate, which may sometimes result in some fuzziness.
22+
**The application-level throttling that REST framework provides should not be considered a security measure or protection against brute forcing or denial-of-service attacks. Deliberately malicious actors will always be able to spoof IP origins. In addition to this, the built-in throttling implementations are implemented using Django's cache framework, and use non-atomic operations to determine the request rate, which may sometimes result in some fuzziness.**
2323

24-
The application-level throttling provided by REST framework is intended for implementing policies such as different business tiers and basic protections against service over-use.**
24+
**The application-level throttling provided by REST framework is intended for implementing policies such as different business tiers and basic protections against service over-use.**
2525

2626
## How throttling is determined
2727

0 commit comments

Comments
 (0)