Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit ec2f12c

Browse filesBrowse files
alvarezmarioweaverryan
authored andcommitted
Improved the sentence
1 parent 26ab6ab commit ec2f12c
Copy full SHA for ec2f12c

File tree

Expand file treeCollapse file tree

1 file changed

+2
-2
lines changed
Filter options
Expand file treeCollapse file tree

1 file changed

+2
-2
lines changed

‎book/security.rst

Copy file name to clipboardExpand all lines: book/security.rst
+2-2Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ perform a certain action.
2020
.. image:: /images/book/security_authentication_authorization.png
2121
:align: center
2222

23-
Since the best way to learn is to see an example, let's start by securing your
24-
application with HTTP Basic authentication.
23+
Since the best way to learn is to see an example, just imagine that you want
24+
to secure your application with HTTP Basic authentication.
2525

2626
.. note::
2727

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.