From f6f9c64a3dad5393ba6b6ad09888ef69c72eac4c Mon Sep 17 00:00:00 2001 From: Robert Wallach Date: Wed, 21 Mar 2018 10:30:10 -0500 Subject: [PATCH] Update security-schemes.md --- articles/modeling/security-schemes.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/articles/modeling/security-schemes.md b/articles/modeling/security-schemes.md index b4f3053..5af0ee6 100644 --- a/articles/modeling/security-schemes.md +++ b/articles/modeling/security-schemes.md @@ -15,7 +15,7 @@ started, the section below outlines some common schemes in use. * Should not be used without SSL, or some other data-in-transit encryption mechanism * Can easily be combined with other security methods -> **Note**, basic authentication is susceptible to hijacks and man-in-the-middle +> **Note**: basic authentication is susceptible to hijacks and man-in-the-middle > attacks when no encryption is in use. Due to this limitation, this method of > authentication is only recommended when paired with SSL. @@ -89,4 +89,4 @@ identify potential security risks. **Related** * [Additional Information on HTTP Status and Error Codes](https://en.wikipedia.org/wiki/List_of_HTTP_status_codes) -* [API Operations](/modeling/introduction/modeling-with-openapi/api-operations) +* [API Operations](/modeling/modeling-with-openapi/api-operations)