Skip to content

Commit

Permalink
docs: fixed broken links (#459)
Browse files Browse the repository at this point in the history
Co-authored-by: hackerman <3372410+aeneasr@users.noreply.github.com>
  • Loading branch information
vinckr and aeneasr authored Jun 4, 2020
1 parent 59d00eb commit 2749596
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions docs/docs/concepts/credentials/username-email-password.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ requires an `identifier` (username, email, phone number, ...) and a `password`
during registration and login.

ORY Kratos hashes the password after registration, password reset, and password
change using the [Argon2 Hashing Algorithm](../../concepts/security.md#Argon2),
change using the [Argon2 Hashing Algorithm](../../concepts/security#Argon2),
the winner of the (https://github.com/P-H-C/phc-winner-argon2)[Password Hashing
Competition (PHC)].

Expand Down Expand Up @@ -51,13 +51,13 @@ identity:
```

If you don't know what that means, please read the
["Concepts: Identity" Chapter](../../concepts/identity-user-model.md).
["Concepts: Identity" Chapter](../../concepts/identity-user-model).

For a complete reference, defaults, and description please check the
[Configuration Reference](../../reference/configuration.md).
[Configuration Reference](../../reference/configuration).

For a better understanding of security implications imposed by Argon2
Configuration, head over to [Argon2 Security](../security.mdx#argon2).
Configuration, head over to [Argon2 Security](../security#argon2).

## Choosing between Username, Email, Phone Number

Expand Down Expand Up @@ -85,7 +85,7 @@ The email address however represents a unique identifier and personally
identifiable information (PII). An attacker could for example check if an email
address (e.g. `john.doe@gmail.com`) is registered at a site (e.g. an adult
website) and use that information for blackmail (see
[Account Enumeration Attacks](../../concepts/security.md#account-enumeration-attacks)).
[Account Enumeration Attacks](../../concepts/security#account-enumeration-attacks)).

The same considerations apply to using a phone number as the primary
registration & login identifier.
Expand Down Expand Up @@ -118,7 +118,7 @@ You need to decide which route you want to take.
### Picking the right JSON Schema

When processing an identity and its traits, the method will use
[JSON Schema](../../reference/json-schema-json-paths.md) to extract one or more
[JSON Schema](../../reference/json-schema-json-paths) to extract one or more
identifiers.

#### Use Case: Email and Password
Expand Down Expand Up @@ -288,7 +288,7 @@ Assuming your traits schema is as follows:

And an identity registers with the following JSON payload (more on registration
in
[Selfservice Registration](../self-service/flows/user-login-user-registration.md)):
[Selfservice Registration](../../self-service/flows/user-login-user-registration)):

```json
{
Expand Down

0 comments on commit 2749596

Please sign in to comment.