Skip to content

Commit 5af28c1

Browse files
authored
Merge pull request #195 from hzoppetti/release-4.13.0
updates with comments from jsager
2 parents 146da72 + e202733 commit 5af28c1

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

openapi.yaml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ info:
4747
| **HTTP Authorization Scheme** | bearer |
4848

4949
## OAuth
50-
If you only need to access the Linode API for personal uses,
50+
If you only need to access the Linode API for personal use,
5151
we recommend that you create a [personal access token](#personal-access-token).
5252
If you're designing an application that can authenticate with an arbitrary Linode user, then
5353
you should use the OAuth 2.0 workflows presented in this section.
@@ -66,7 +66,7 @@ info:
6666
### OAuth Workflow
6767

6868
The OAuth workflow is a series of exchanges between your third-party app and Linode. The workflow is used
69-
to authenticate a User before an application can start making API calls on the User's behalf.
69+
to authenticate a user before an application can start making API calls on the user's behalf.
7070

7171
Notes:
7272

@@ -76,19 +76,19 @@ info:
7676

7777
| PRIVATE WORKFLOW | PUBLIC WORKFLOW |
7878
|------------------|------------------|
79-
| 1. The User visits the application's website and is directed to login with Linode. | 1. The User visits the application's website and is directed to login with Linode. |
79+
| 1. The user visits the application's website and is directed to login with Linode. | 1. The user visits the application's website and is directed to login with Linode. |
8080
| 2. Your application then redirects the user to Linode's [login server](https://login.linode.com) with the client application's `client_id` and requested OAuth `scope`, which should appear in the URL of the login page. | 2. Your application then redirects the user to Linode's [login server](https://login.linode.com) with the client application's `client_id` and requested OAuth `scope`, which should appear in the URL of the login page. |
8181
| 3. The user logs into the login server with their username and password. | 3. The user logs into the login server with their username and password. |
82-
| 4. The login server redirects the user to the specificed redirect URL with a temporary authorization `code` (exchange code) in the URL. | 4. The login server redirects the user back to your application with an OAuth `access_token` embedded in the redirect URL's hash. This is temporary and expires in 2 hours. No `refresh_token` is issued. Therefore, once the `access_token` expires, a new one will need to be issued by having the user log in again. |
82+
| 4. The login server redirects the user to the specificed redirect URL with a temporary authorization `code` (exchange code) in the URL. | 4. The login server redirects the user back to your application with an OAuth `access_token` embedded in the redirect URL's hash. This is temporary and expires in two hours. No `refresh_token` is issued. Therefore, once the `access_token` expires, a new one will need to be issued by having the user log in again. |
8383
| 5. The application issues a POST request (*see below*) to the login server with the exchange code, `client_id`, and the client application's `client_secret`. | |
84-
| 6. The login server responds to the client application with a new OAuth `access_token` and `refresh_token`. The `access_token` is set to expire in 2 hours. | |
85-
| 7. The `refresh_token` can be used by contacting the login server with the `client_id`, `client_secret`, and `refresh_token` to get a new OAuth `access_token` and `refresh_token`. The new `access_token` is good for another 2 hours, and the new `refresh_token`, can be used to extend the session again by this same method. | |
84+
| 6. The login server responds to the client application with a new OAuth `access_token` and `refresh_token`. The `access_token` is set to expire in two hours. | |
85+
| 7. The `refresh_token` can be used by contacting the login server with the `client_id`, `client_secret`, and `refresh_token` to get a new OAuth `access_token` and `refresh_token`. The new `access_token` is good for another two hours, and the new `refresh_token`, can be used to extend the session again by this same method. | |
8686

8787
### OAuth Private Workflow - Additional Details
8888

8989
The following information expands on steps 5 through 7 of the private workflow:
9090

91-
Once the User has logged into Linode and you have received an exchange code,
91+
Once the user has logged into Linode and you have received an exchange code,
9292
you will need to trade that exchange code for an `access_token` and `refresh_token`. You
9393
do this by making an HTTP POST request to the following address:
9494

0 commit comments

Comments
 (0)