diff --git a/docs.it4i/general/obtaining-login-credentials/obtaining-login-credentials.md b/docs.it4i/general/obtaining-login-credentials/obtaining-login-credentials.md
index 29cb4102e9c683c448f560b1da816e53265143a9..8f836885e25e706a2e85ba8587b489aa647ba395 100644
--- a/docs.it4i/general/obtaining-login-credentials/obtaining-login-credentials.md
+++ b/docs.it4i/general/obtaining-login-credentials/obtaining-login-credentials.md
@@ -2,7 +2,7 @@
 
 ## Obtaining Authorization
 
-The computational resources of IT4I are allocated by the Allocation Committee to a Project, investigated by a Primary Investigator. By [allocating][r] the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of her/his Collaborators to access and use the clusters, to consume the resources allocated to her/his Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:
+The computational resources of IT4I are [allocated][r] by the Allocation Committee to a Project, investigated by a Primary Investigator. By [allocating the computational resources][r], the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of her/his Collaborators to access and use the clusters, to consume the resources allocated to her/his Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:
 
 ![](../../img/Authorization_chain.png)