Skip to content
This repository was archived by the owner on Aug 7, 2025. It is now read-only.

Commit d4deffa

Browse files
committed
Fix linting issue
1 parent e5f1693 commit d4deffa

File tree

1 file changed

+3
-1
lines changed
  • content/en/user-guide/aws/cognito

1 file changed

+3
-1
lines changed

content/en/user-guide/aws/cognito/index.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -330,6 +330,7 @@ Ensuring this match is crucial for the proper functioning of the authentication
330330
'http://localhost:4566/_aws/cognito-idp/oauth2/token'
331331
{"access_token": "eyJ0eXAi…lKaHx44Q", "expires_in": 86400, "token_type": "Bearer", "refresh_token": "e3f08304", "id_token": "eyJ0eXAi…ADTXv5mA"}
332332
```
333+
333334
### Client credentials grant
334335

335336
The client credentials grant is designed for machine-to-machine (M2M) communication.
@@ -357,7 +358,8 @@ awslocal cognito-idp create-resource-server \
357358
--user-pool-id $pool_id \
358359
--identifier "api-client-organizations" \
359360
--name "vitalera API Clients Organizations Resource Server" \
360-
--scopes '[{"ScopeName":"read","ScopeDescription":"Read access to Organizations"}]'
361+
--scopes '[{"ScopeName":"read","ScopeDescription":"Read access to Organizations"}]'
362+
361363
```
362364

363365
Then you could retrieve the token from your application like this:

0 commit comments

Comments
 (0)