Skip to content

Fix grammar and readability in employee identity docs#5998

Open
Ayoraaaa wants to merge 2 commits intowso2:masterfrom
Ayoraaaa:patch-1
Open

Fix grammar and readability in employee identity docs#5998
Ayoraaaa wants to merge 2 commits intowso2:masterfrom
Ayoraaaa:patch-1

Conversation

@Ayoraaaa
Copy link
Copy Markdown

@Ayoraaaa Ayoraaaa commented Mar 18, 2026

Fixed grammatical errors:

  • implanted → implemented
  • identifies → identities
  • relogin → log in again
  • increase → increases
  • Corrected spelling: on-boarding → onboarding
  • Improved bullet formatting for MFA and other lists
  • Removed trailing spaces and extra line breaks
  • Left {{product_name}} placeholders intact

Purpose

This PR improves the employee identity documentation by fixing grammar and formatting issues to enhance readability and maintain consistency across the docs. No functional changes were made to the content.

Related PRs

None

Test environment

Tested on GitHub Markdown preview.

Security checks

Summary by CodeRabbit

  • Documentation
    • Improved clarity, grammar, and consistency across workforce IAM content, including onboarding, SSO, and self-management sections.
    • Standardized and reformatted MFA and authentication guidance for clearer, parallel phrasing and punctuation.
    • Reworded passwordless and login-related guidance for readability and consistent tone.

 Fixed grammatical errors:
  - implanted → implemented
  - identifies → identities
  - relogin → log in again
  - increase → increases
- Corrected spelling: on-boarding → onboarding
- Improved bullet formatting for MFA and other lists
- Removed trailing spaces and extra line breaks
- Left {{product_name}} placeholders intact
@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai bot commented Mar 18, 2026

Walkthrough

Editorial updates to the Workforce IAM documentation: grammatical fixes, punctuation and phrasing polishing, terminology standardization, and reorganization of MFA/authentication bullets. No functional or API changes were made.

Changes

Cohort / File(s) Summary
Documentation Editorial Updates
en/includes/concepts/workforce-iam.md
Wording and typographical corrections across headings and bullets; standardized terminology (e.g., "onboarding", "Eliminate the need for passwords"); restructured MFA/authentication lists for parallel structure and punctuation consistency; minor spacing/formatting tweaks.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~10 minutes

Poem

🐰 I nibbled through each line and rhyme,

Polished phrases, saved some time,
Bullets trimmed and commas kissed,
Workforce IAM now reads with bliss,
Hooray — the docs are looking fine!

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and accurately summarizes the main change: fixing grammar and readability issues in the employee identity documentation.
Description check ✅ Passed The description includes all required template sections (Purpose, Related PRs, Test environment, Security checks) with appropriate details for a grammar/formatting fix PR.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
📝 Coding Plan
  • Generate coding plan for human review comments

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Tip

CodeRabbit can generate a title for your PR based on the changes.

Add @coderabbitai placeholder anywhere in the title of your PR and CodeRabbit will replace it with a title based on the changes in the PR. You can change the placeholder by changing the reviews.auto_title_placeholder setting.

Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 3

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@en/includes/concepts/workforce-iam.md`:
- Line 27: Remove the unintended leading whitespace at the start of the sentence
in en/includes/concepts/workforce-iam.md so the line beginning "Eliminate the
need for passwords and offer secure passwordless authentication for your
workforce using Magic Link, Passkeys, biometrics and Email/SMS OTPs." starts
flush with no leading space; edit that line to remove the extra space and ensure
markdown renders cleanly.
- Line 71: Update the user-facing sentence that currently reads "Allow users to
login with multiple login identities" in the workforce-iam.md content to use the
correct verb form: change "login" to "log in" so the line reads "Allow users to
log in with multiple login identities"; ensure any other occurrences in the same
file follow this same "log in" verb form for consistency.
- Line 5: Replace the incorrect user-action phrasing "login in again" with the
correct verb phrase "log in again" in the sentence about Enterprise
Single-Sign-On; also scan the surrounding text for other usages and standardize
to "log in" for the action and reserve "login" for the noun (e.g., "a login") to
keep terminology consistent within the document.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 8fb060ff-cf83-4dc3-9cd7-84983a195187

📥 Commits

Reviewing files that changed from the base of the PR and between 0db1ae7 and cc81e15.

📒 Files selected for processing (1)
  • en/includes/concepts/workforce-iam.md

@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Mar 18, 2026

CLA assistant check
All committers have signed the CLA.

Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Nitpick comments (1)
en/includes/concepts/workforce-iam.md (1)

15-15: Split this into shorter, active-voice sentences.

Line 15 is hard to parse and uses passive phrasing (“can be implemented”). Please rewrite in shorter sentences and address the reader directly.

✏️ Suggested rewrite
-Automate and create unified onboarding experiences for your workforce by integrating various onboarding channels such as HRM systems, existing AD and LDAP directories with {{product_name}} to create a unified view of your workforce that enables centralized workforce management. Different provisioning and deprovisioning policies can be implemented as per workforce variance based on their employment such as full-time, contractual and outsourced and based on their job roles.  
+Integrate onboarding channels such as HRM systems and existing AD and LDAP directories with {{product_name}} to create a unified workforce view. This lets you manage workforce identities centrally. You can then apply different provisioning and deprovisioning policies based on employment type (full-time, contractual, or outsourced) and job role.

As per coding guidelines, "**/*.md: Use active voice and present tense; ... Use plain language and short sentences; Address the reader as 'you'".

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/includes/concepts/workforce-iam.md` at line 15, Rewrite the long sentence
into 2–4 short, active sentences that address the reader as "you" and use
present tense; mention integrating HRM systems, AD/LDAP directories, and
{{product_name}} separately, then state that you create a unified workforce view
for centralized management, and finally say that you can implement different
provisioning and deprovisioning policies for full-time, contract, and outsourced
roles based on job role—avoid passive phrasing like "can be implemented" and
keep each sentence simple and direct.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@en/includes/concepts/workforce-iam.md`:
- Line 27: Trim the trailing whitespace at the end of the line containing
"Eliminate the need for passwords and offer secure passwordless authentication
for your workforce using Magic Link, Passkeys, biometrics and Email/SMS OTPs."
so the line ends immediately after "OTPs." and re-run Vale locally to ensure no
remaining warnings; commit the cleaned line.
- Line 40: Update the compound modifiers in the workforce-iam content to use
hyphens for readability: change "ready to use templates" to "ready-to-use
templates" and similarly hyphenate phrases like "OpenID Connect supported" →
"OpenID Connect-supported" and "SAML 2.0 supported" → "SAML 2.0-supported";
apply the same hyphenation to the repeated instances referenced (lines ~59-60)
and ensure sentences remain short and plain per the style guidelines.

---

Nitpick comments:
In `@en/includes/concepts/workforce-iam.md`:
- Line 15: Rewrite the long sentence into 2–4 short, active sentences that
address the reader as "you" and use present tense; mention integrating HRM
systems, AD/LDAP directories, and {{product_name}} separately, then state that
you create a unified workforce view for centralized management, and finally say
that you can implement different provisioning and deprovisioning policies for
full-time, contract, and outsourced roles based on job role—avoid passive
phrasing like "can be implemented" and keep each sentence simple and direct.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 4c84a2b6-c020-4a0c-a174-f271fe56a9af

📥 Commits

Reviewing files that changed from the base of the PR and between cc81e15 and 4da6d88.

📒 Files selected for processing (1)
  • en/includes/concepts/workforce-iam.md

Secure user accounts of your workforce and business applications by enforcing MFA options. {{product_name}} offers secure MFA options including SMS and Email OTP, TOTP using authenticator apps, FIDO-based Passkeys, Duo-based push notifications and hardware tokens and facial biometrics such as iProov.

Get rid of passwords completely and offer secure passwordless authentication for your workforce using Magic Link, Passkeys, biometrics and Email/SMS OTPs.
Eliminate the need for passwords and offer secure passwordless authentication for your workforce using Magic Link, Passkeys, biometrics and Email/SMS OTPs.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Remove trailing whitespace at end of line.

Line 27 ends with extra spaces. Please trim trailing whitespace to keep markdown clean and avoid noisy diffs.

As per coding guidelines, "Run Vale locally and resolve all warnings before finalizing documentation".

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/includes/concepts/workforce-iam.md` at line 27, Trim the trailing
whitespace at the end of the line containing "Eliminate the need for passwords
and offer secure passwordless authentication for your workforce using Magic
Link, Passkeys, biometrics and Email/SMS OTPs." so the line ends immediately
after "OTPs." and re-run Vale locally to ensure no remaining warnings; commit
the cleaned line.

{{product_name}} automatically configures a default login flow for you to get started. You can design your desired login flow by adding social providers or MFA options using {{product_name}}'s visual login flow designer, where you can drag and drop the required elements. Alternatively, you can use the Login Flow AI feature to generate the desired login flow based on your plain text instructions.

Make workforce authentication adaptive by adjusting authentication options such as adaptive MFA , adaptive access control and passkey enrollment as per the current risk level assessed using contextual parameters such as location, device and behavior. {{product_name}} offers a set of ready to use templates that can be configured for your workforce requirements and you can also develop your own adaptive authentication scripts.
Make workforce authentication adaptive by adjusting authentication options such as adaptive MFA, adaptive access control and passkey enrollment as per the current risk level assessed using contextual parameters such as location, device and behavior. {{product_name}} offers a set of ready to use templates that can be configured for your workforce requirements and you can also develop your own adaptive authentication scripts.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Hyphenate compound modifiers for readability.

Use hyphens in compound modifiers before nouns: ready-to-use, OpenID Connect-supported, and SAML 2.0-supported.

✏️ Suggested edits
-Make workforce authentication adaptive by adjusting authentication options such as adaptive MFA, adaptive access control and passkey enrollment as per the current risk level assessed using contextual parameters such as location, device and behavior. {{product_name}} offers a set of ready to use templates that can be configured for your workforce requirements and you can also develop your own adaptive authentication scripts. 
+Make workforce authentication adaptive by adjusting authentication options such as adaptive MFA, adaptive access control, and passkey enrollment based on the current risk level assessed using contextual parameters such as location, device, and behavior. {{product_name}} offers a set of ready-to-use templates that you can configure for your workforce requirements, and you can also develop your own adaptive authentication scripts.
-- Configure SSO for OpenID Connect supported applications
-- Configure SSO for SAML 2.0 supported applications
+- Configure SSO for OpenID Connect-supported applications
+- Configure SSO for SAML 2.0-supported applications

As per coding guidelines, "Use plain language and short sentences" and "Run Vale locally and resolve all warnings before finalizing documentation".

Also applies to: 59-60

🧰 Tools
🪛 LanguageTool

[grammar] ~40-~40: Use a hyphen to join words.
Context: .... {{product_name}} offers a set of ready to use templates that can be configured ...

(QB_NEW_EN_HYPHEN)


[grammar] ~40-~40: Use a hyphen to join words.
Context: ...{product_name}} offers a set of ready to use templates that can be configured for...

(QB_NEW_EN_HYPHEN)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/includes/concepts/workforce-iam.md` at line 40, Update the compound
modifiers in the workforce-iam content to use hyphens for readability: change
"ready to use templates" to "ready-to-use templates" and similarly hyphenate
phrases like "OpenID Connect supported" → "OpenID Connect-supported" and "SAML
2.0 supported" → "SAML 2.0-supported"; apply the same hyphenation to the
repeated instances referenced (lines ~59-60) and ensure sentences remain short
and plain per the style guidelines.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants