@@ -330,7 +330,7 @@ and `test`. The URL `https://localhost:3443/v1/auth/tokens` should also work in
330330
331331The following example logs in using the Admin Super-User:
332332
333- #### :one: Request:
333+ #### 1️⃣ Request:
334334
335335```console
336336curl -iX POST \
@@ -379,7 +379,7 @@ You can use the long-lasting `X-Auth-token=aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa`
379379tutorial. Both ` {{X-Auth-token}} ` and ` {{X-Subject-token}} ` can be set to the same value in the case that Alice is
380380making an enquiry about herself.
381381
382- #### : two : Request:
382+ #### 2️⃣ Request:
383383
384384``` console
385385curl -X GET \
@@ -452,7 +452,7 @@ To create a new PEP Proxy account within an application, send a POST request to
452452` /v1/applications/{{application-id}}/pep_proxies ` endpoint along with the ` X-Auth-token ` header from a previously logged
453453in administrative user.
454454
455- #### : three : Request:
455+ #### 3️⃣ Request:
456456
457457``` console
458458curl -iX POST \
@@ -480,7 +480,7 @@ created with a unique `id` and `password` and the values will be returned in the
480480Making a GET request to the ` /v1/applications/{{application-id}}/pep_proxies ` endpoint will return the details of the
481481associated PEP Proxy Account. The ` X-Auth-token ` must be supplied in the headers.
482482
483- #### : four : Request:
483+ #### 4️⃣ Request:
484484
485485``` console
486486curl -X GET \
@@ -505,7 +505,7 @@ To renew the password of a PEP Proxy Account, make a PATCH request to the
505505` /v1/applications/{{application-id}}/pep_proxies ` endpoint will return the details of the associated PEP Proxy Account.
506506The ` X-Auth-token ` must be supplied in the headers.
507507
508- #### : five : Request:
508+ #### 5️⃣ Request:
509509
510510``` console
511511curl -X PATCH \
@@ -529,7 +529,7 @@ The response returns a new password for the PEP Proxy Account
529529An existing PEP Proxy Account can be deleted by making a DELETE request to the
530530` /v1/applications/{{application-id}}/pep_proxies ` endpoint. The ` X-Auth-token ` must be supplied in the headers.
531531
532- #### : six : Request:
532+ #### 6️⃣ Request:
533533
534534``` console
535535curl -X DELETE \
@@ -558,7 +558,7 @@ To create a new IoT Agent account within an application, send a POST request to
558558` /v1/applications/{{application-id}}/iot_agents ` endpoint along with the ` X-Auth-token ` header from a previously logged
559559in administrative user.
560560
561- #### : seven : Request:
561+ #### 7️⃣ Request:
562562
563563``` console
564564curl -X POST \
@@ -585,7 +585,7 @@ A new account will be created with a unique `id` and `password` and the values w
585585Making a GET request the ` /v1/applications/{{application-id}}/iot_agents/{{iot-agent-id}} ` endpoint will return the
586586details of the associated IoT Agent Account. The ` X-Auth-token ` must be supplied in the headers.
587587
588- #### : eight : Request:
588+ #### 8️⃣ Request:
589589
590590``` console
591591curl -X GET \
@@ -609,7 +609,7 @@ curl -X GET \
609609A list of all IoT Agents associated with an application can be obtained by making a GET request the
610610` /v1/applications/{{application-id}}/iot_agents ` endpoint. The ` X-Auth-token ` must be supplied in the headers.
611611
612- #### : nine : Request:
612+ #### 9️⃣ Request:
613613
614614``` console
615615curl -X GET \
@@ -634,7 +634,7 @@ curl -X GET \
634634
635635### Reset Password of an IoT Agent
636636
637- #### : one :: zero : Request:
637+ #### 1️⃣0️⃣ Request:
638638
639639To renew the password of an individual IoT Agent Account, make a PATCH request to the
640640` /v1/applications/{{application-id}}//iot_agents/{{iot-agent-id}} ` endpoint. The ` X-Auth-token ` must be supplied in the
@@ -663,7 +663,7 @@ An existing IoT Agent Account can be deleted by making a DELETE request to the
663663` /v1/applications/{{application-id}}/iot_agents/{{iot-agent-id}} ` endpoint. The ` X-Auth-token ` must be supplied in the
664664headers.
665665
666- #### : one :: one : Request:
666+ #### 1️⃣1️⃣ Request:
667667
668668``` console
669669curl -X DELETE \
@@ -814,7 +814,7 @@ Secured Access can be ensured by requiring all requests to the secured service a
814814this case the PEP Proxy is found in front of the Context Broker). Requests must include an `X-Auth-Token`, failure to
815815present a valid token results in a denial of access.
816816
817- # ### :one::two: Request:
817+ # ### 1️⃣2️⃣ Request:
818818
819819If a request to the PEP Proxy is made without any access token as shown :
820820
@@ -833,7 +833,7 @@ Auth-token not found in request header
833833
834834# ## Keyrock - User Obtains an Access Token
835835
836- # ### :one::three: Request:
836+ # ### 1️⃣3️⃣ Request:
837837
838838To log in to the application using the user-credentials flow send a POST request to **Keyrock** using the `oauth2/token`
839839endpoint with the `grant_type=password`. For example to log-in as Alice the Admin :
@@ -869,7 +869,7 @@ If a request to the PEP Proxy is made including a valid access token in the `X-A
869869is permitted and the service behind the PEP Proxy (in this case the Orion Context Broker) will return the data as
870870expected.
871871
872- # ### :one::four: Request:
872+ # ### 1️⃣4️⃣ Request:
873873
874874` ` ` console
875875curl -X GET \
@@ -883,7 +883,7 @@ The standard `Authorization: Bearer` header can also be used to identity the use
883883is permitted and the service behind the PEP Proxy (in this case the Orion Context Broker) will return the data as
884884expected.
885885
886- # ### :one::five: Request:
886+ # ### 1️⃣5️⃣ Request:
887887
888888` ` ` console
889889curl -X GET \
@@ -1066,7 +1066,7 @@ this case Kong is acting as a PEP Proxy is found in front of the Context Broker)
10661066Successful requests must include an `Authentiction` header, failure to present a valid token results in a denial of
10671067access.
10681068
1069- # ### :one::six: Request:
1069+ # ### 1️⃣6️⃣ Request:
10701070
10711071If a request to the PEP Proxy is made without any access token as shown :
10721072
@@ -1085,7 +1085,7 @@ Request forbidden by authorization service Keyrock.
10851085
10861086# ## Keyrock - User Obtains an Access Token
10871087
1088- # ### :one::seven: Request:
1088+ # ### 1️⃣7️⃣ Request:
10891089
10901090To log in to the application using the user-credentials flow send a POST request to **Keyrock** using the `oauth2/token`
10911091endpoint with the `grant_type=password`. For example to log-in as Alice the Admin :
@@ -1121,7 +1121,7 @@ If a request to the PEP Proxy is made including a valid access token in the `X-A
11211121is permitted and the service behind the PEP Proxy (in this case the Orion Context Broker) will return the data as
11221122expected.
11231123
1124- # ### :one::eight: Request:
1124+ # ### 1️⃣8️⃣ Request:
11251125
11261126` ` ` console
11271127curl -X GET \
@@ -1290,7 +1290,7 @@ Logging in as an IoT Sensor follows the same user-credentials flow as for a User
12901290` iot_sensor_00000000-0000-0000-0000-000000000000` with password `test` send a POST request to **Keyrock** using the
12911291`oauth2/token` endpoint with the `grant_type=password` :
12921292
1293- # ### :one::five: Request:
1293+ # ### 1️⃣5️⃣ Request:
12941294
12951295` ` ` console
12961296curl -iX POST \
@@ -1323,7 +1323,7 @@ The POST request to a PEP Proxy in front to the Ultralight IoT Agent identifies
13231323the source of the request as being registered in Keyrock, and therefore the measurement will be successfully passed on
13241324to the IoT Agent itself.
13251325
1326- # ### :one::nine: Request:
1326+ # ### 1️⃣9️⃣ Request:
13271327
13281328` ` ` console
13291329curl -X POST \
@@ -1454,7 +1454,7 @@ The standard `Authorization: Basic` header holds the base 64 concatentation of t
14541454` scope=permanent` is added to retrieve permanent tokens when available. The response contains an `access_token` which
14551455can be used for device provisioning.
14561456
1457- # ### :two::zero: Request:
1457+ # ### 2️⃣0️⃣ Request:
14581458
14591459` ` ` console
14601460curl -X POST \
@@ -1489,7 +1489,7 @@ been provisioned as shown:
14891489}
14901490` ` `
14911491
1492- # ### :two::one: Request:
1492+ # ### 2️⃣1️⃣ Request:
14931493
14941494> **Note:** use the `access_token` from the previous request.
14951495
@@ -1511,7 +1511,7 @@ The Motion sensor requests are now sent via the `orion-proxy` and identify thems
15111511
15121512Once a trusted service group has been created, a device can be provisioned in the usual manner
15131513
1514- # ### :two::two: Request:
1514+ # ### 2️⃣2️⃣ Request:
15151515
15161516` ` ` console
15171517curl -iX POST \
0 commit comments