@@ -175,8 +175,8 @@ You can configure the OIDC for GCP IMDS by setting the ``mechanism`` field of yo
175175specifies the authentication mechaism by using the following placeholders in the
176176``mechanism_properties`` field:
177177
178- - ``ENVIRONMENT``: Set this to ``gcp``.
179- - ``TOKEN_RESOURCE``: Set this to the value of the audience parameter configured
178+ - ``ENVIRONMENT``: Set this property to ``gcp``.
179+ - ``TOKEN_RESOURCE``: Set this property to the value of the audience parameter configured
180180 on your MongoDB deployment.
181181
182182.. literalinclude:: /includes/fundamentals/code-snippets/enterprise-auth.rs
@@ -196,9 +196,9 @@ including the AWS Elastic Kubernetes Service (EKS). To authenticate
196196against unsupported platforms, you must define a custom callback
197197function to use OIDC to authenticate.
198198
199- The following example defines a custom callback for an EKS
200- cluster with a configured IAM OIDC provider. The access token is
201- read from a path set in the ``AWS_WEB_IDENTITY_TOKEN_FILE`` environment
199+ The following example defines a custom callback for an EKS cluster with a
200+ configured Identity and Access Management ( IAM) OIDC provider. The access token
201+ is read from a path set in the ``AWS_WEB_IDENTITY_TOKEN_FILE`` environment
202202variable. Then, you can set the ``oidc_callback`` field of your ``Credential``
203203struct to ``oidc::Callback::machine``:
204204
@@ -207,16 +207,18 @@ struct to ``oidc::Callback::machine``:
207207 :dedent:
208208 :start-after: start-custom-callback-machine
209209 :end-before: end-custom-callback-machine
210+ :emphasize-lines: 3, 5-10
210211
211- For workforce identity, you must configure the client by setting the
212- ``oidc_callback`` field of your ``Credential`` struct to
213- ``oidc::Callback::human`` instead of ``oidc::Callback::machine``. The
214- {+driver-short+} uses the callback in the following process:
212+ When the workforce identity authentication process involves human interaction,
213+ you must configure the client by setting the ``oidc_callback`` field of your
214+ ``Credential`` struct to ``oidc::Callback::human`` instead of
215+ ``oidc::Callback::machine``. The {+driver-short+} uses the callback in the
216+ following process:
215217
216- 1. The driver retrieves the Identiy Provider Information (IDPInfo) for the
218+ 1. The driver retrieves the Identity Provider Information (IDPInfo) for the
217219 provided username.
2182202. The callback negotiates with the IDP to obtain an ``AccessToken``, possible
219- ``RefreshToken``, and any times . Then, it returns them, similar to the
221+ ``RefreshToken``, and any timeouts . Then, it returns them, similar to the
220222 ``OIDCMachineCallbacks``.
221223
222224The following example defines a custom callback to handle workforce identity.
0 commit comments