diff --git a/Documentation/connectors/kubelogin-activedirectory.md b/Documentation/connectors/kubelogin-activedirectory.md
index e6a922f02987c1500beecf33b60b0b2c5a7a2a19..cb47a514f4a3aba310ee53d816c6b9f35aaa24d2 100644
--- a/Documentation/connectors/kubelogin-activedirectory.md
+++ b/Documentation/connectors/kubelogin-activedirectory.md
@@ -40,10 +40,10 @@ subjectAltName = @alt_names
 DNS.1 = dex.example.com
 ```
 
-Please replace dex.example.com to your favorit hostname.
+Please replace dex.example.com to your favorite hostname.
 Generate certificate and private key by following command.
 
-```
+```console
 $ openssl req -new -x509 -sha256 -days 3650 -newkey rsa:4096 -extensions v3_req -out openid-ca.pem -keyout openid-key.pem -config req.cnf -subj "/CN=kube-ca" -nodes
 $ ls openid*
 openid-ca.pem openid-key.pem
@@ -53,7 +53,7 @@ openid-ca.pem openid-key.pem
 
 Modify following host, bindDN and bindPW in examples/config-ad-kubelogin.yaml.
 
-```
+```yaml
 connectors:
 - type: ldap
   name: OpenLDAP
@@ -99,27 +99,27 @@ See https://kubernetes.io/docs/reference/access-authn-authz/authentication/ for
 
 Create context for dex authentication:
 
-```
+```console
 $ kubectl config set-context oidc-ctx --cluster=cluster.local --user=test
-$ kubectl config set-credentials test 
+$ kubectl config set-credentials test \
   --auth-provider=oidc \
   --auth-provider-arg=idp-issuer-url=https://dex.example.com:32000/dex \
   --auth-provider-arg=client-id=kubernetes \
   --auth-provider-arg=client-secret=ZXhhbXBsZS1hcHAtc2VjcmV0 \
   --auth-provider-arg=idp-certificate-authority-data=$(base64 -w 0 openid-ca.pem) \
-  "--auth-provider-arg=extra-scopes=offline_access openid profile email group"
+  --auth-provider-arg=extra-scopes="offline_access openid profile email group"
 $ kubectl config use-context oidc-ctx
 ```
 
-Please confirm idp-issuer-url, cleint-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
+Please confirm idp-issuer-url, client-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
 
 Then run kubelogin:
 
-```
+```console
 $ kubelogin
 ```
 
-Access http://localhost:8000 by web browser and login with your AD account(eg. test@example.com) and password.
+Access http://localhost:8000 by web browser and login with your AD account (eg. test@example.com) and password.
 After login and grant, you have following token in ~/.kube/config:
 
 ```
diff --git a/Documentation/connectors/ldap.md b/Documentation/connectors/ldap.md
index 0a23257e5891be146e81a58f1ff72f38f12f2fef..20f0e406aa093b5728368d8c0286c2645bc3259c 100644
--- a/Documentation/connectors/ldap.md
+++ b/Documentation/connectors/ldap.md
@@ -253,7 +253,6 @@ groupSearch:
 The following configuration will allow the LDAP connector to search a FreeIPA directory using an LDAP filter.
 
 ```yaml
-
 connectors:
 - type: ldap
   id: ldap
@@ -290,7 +289,6 @@ If the search finds an entry, it will attempt to use the provided password to bi
 The following configuration will allow the LDAP connector to search a Active Directory using an LDAP filter.
 
 ```yaml
-
 connectors:
 - type: ldap
   name: ActiveDirectory
@@ -320,6 +318,5 @@ connectors:
       userAttr: DN
       groupAttr: member
       nameAttr: cn
-
 ```