diff --git a/web/compute/vm.rst b/web/compute/vm.rst
index cb2030d61521656025ed9c2cb10e13a9dd2c22b7..ee4c0f2f8c5970c794301c76e2a69960b9fd3055 100644
--- a/web/compute/vm.rst
+++ b/web/compute/vm.rst
@@ -20,8 +20,8 @@ The following predefined machine types are currently offered:
    +-------------+---------+--------+-------+
    | m1.xxl      | 16      | 64GB   | 80GB  |
    +-------------+---------+--------+-------+
-
-
+   | c1.large    | 32      | 32GB   | 800GB |
+   +-------------+---------+--------+-------+
 
 .. raw:: html
 
diff --git a/web/support/kb/cloud/federated_auth.rst b/web/support/kb/cloud/federated_auth.rst
index 2471216c4e30f184060b577485caaaa157a95628..64d5830aea80f632798f16d399d385087ada52e3 100644
--- a/web/support/kb/cloud/federated_auth.rst
+++ b/web/support/kb/cloud/federated_auth.rst
@@ -65,21 +65,20 @@ file.
 
 Open `/etc/keystone/keystone.conf` and add/modify directives as instructed.
 
-
-In the `[auth]` section the property `methods` should look like:
+- In the `[auth]` section the property `methods` should look like:
 
 .. code-block:: ini
 		
    methods = external,password,token,oauth1,oidc,saml2
 
-In the `[auth]` section you should add:
+- In the `[auth]` section you should add:
   
 .. code-block:: ini
 		
    saml2 = keystone.auth.plugins.mapped.Mapped                                                       
    oidc = keystone.auth.plugins.mapped.Mapped
         
-Add three new sections at the end of the file:
+- Add three new sections at the end of the file:
   
 .. code-block:: ini
 		
@@ -92,7 +91,7 @@ Add three new sections at the end of the file:
    [federation]
    trusted_dashboard = https://OPENSTACK_DASHBOARD_FQDN/auth/websso/
 
-Finally, restart the Apache HTTP Server to enable the new configuration:
+- Finally, restart the Apache HTTP Server to enable the new configuration:
 
 .. code-block:: bash
 		
@@ -156,7 +155,7 @@ certificate:
    $ wget https://www.idem.garr.it/documenti/doc_download/321-idem-metadata-signer-2019 -O /etc/shibboleth/idem_signer_2019.pem
    $ chmod 444 /etc/shibboleth/idem_signer_2019.pem
 
-.. seealso:: To publish your service and make it recognized by all the 
+.. seealso:: To publish your service and have it recognized by all the 
 	     eduGAIN IdPs, you first need to register the Service Provider
 	     in a national R&E identity federation.
 
@@ -178,7 +177,6 @@ import the metadata aggregate.
 
 entityID
 ^^^^^^^^
-
 To configure the entityID insert your `SERVICE_PROVIDER_ENTITY_ID`
 as an attribute of the `<ApplicationDefaults>` tag: 
 
@@ -189,7 +187,6 @@ as an attribute of the `<ApplicationDefaults>` tag:
 
 Discovery Service
 ^^^^^^^^^^^^^^^^^
-
 A discovery service let users choose to which IdP they should be
 redirected for authentication. It goes without saying that the local
 discovery service that better integrates into Shibboleth Service Provider
@@ -256,7 +253,7 @@ Restart Apache to enable the new directive.
 
 Configure the discovery service in Shibboleth Service Provider. Open the file 
 `/etc/shibboleth/shibboleth2.xml` and add the attribute `discoveryURL` to the 
-tag `SSO` with the URL of the local discovery service:  
+tag `SSO` with the URL of the local discovery service:
 
 .. code-block:: xml
 
@@ -271,14 +268,15 @@ Metadata
 
 Configure a metadata provider in Shibboleth Service Provider.
 
-.. warning:: Please note that configuring metadata is not at all
-	     sufficient to use federated authentication. You MUST
-	     register in a R&E National Identity Federation, see
-	     above the section 'Shibboleth Service Provider' for
+.. warning:: Please note that configuring metadata is not enough
+	     for using the federated authentication. You *must*
+	     register in a `R&E National Identity Federation`, see
+	     above the section `Shibboleth Service Provider` for
 	     instructions.
  
-Insert a new `<MetadataProvider>` with the eduGAIN metadata aggregate
-(in the example the aggregate is provided by the IDEM federation):
+Insert a new `<MetadataProvider>` with the `eduGAIN` metadata aggregate
+(in the example the aggregate is provided by the `IDEM federation`)
+:
 
 .. code-block:: xml
   
@@ -305,20 +303,20 @@ the definitions of the following attributes:
    <Attribute name="urn:mace:dir:attribute-def:displayName" id="displayName"/>
    <Attribute name="urn:mace:dir:attribute-def:mail" id="mail"/>
 
-Finally there are a number of changes required in the Keystone Apache 
-VirtualHost in order to enable the module and configure the endpoints.
+Finally there are a number of changes required in the `Keystone Apache
+VirtualHost` in order to enable the module and configure the endpoints.
 Open the `/etc/apache/sites-enabled/wsgi-openstack-api.conf` with an editor
 of your choice and follow the instruction below.
 
-Enable the ShibCompatValidUser (necessary to make `mod_shib` works 
-well with other Apache authZ modules), insert the following at the 
-very beginning of the VirtualHost conf file:
+Enable the `ShibCompatValidUser` (necessary to make `mod_shib` works 
+well with other `Apache authZ` modules), insert the following at the 
+very beginning of the `VirtualHost` conf file:
   
 .. code-block:: apacheconf
    
    ShibCompatValidUser On
 
-Configure ServerName and enable canonical name in the `<VirtualHost *:4990>` 
+Configure `ServerName` and enable canonical name in the `<VirtualHost *:4990>` 
 instance:
   
 .. code-block:: apacheconf
@@ -326,14 +324,14 @@ instance:
    ServerName https://FQDN:5000
    UseCanonicalName On
    
-Configure a WSGIScriptAlilas to call back the WSGI daemon for federated
+Configure a `WSGIScriptAlilas` to call back the `WSGI` daemon for federated
 auth (again inside the `<VirtualHost *:4990>` instance):
 
 .. code-block:: apacheconf
 
    WSGIScriptAlias ^(/v3/OS-FEDERATION/identity_providers/.*?/protocols/.*?/auth)$ /usr/bin/keystone-wsgi-public/$1
 
-Add the Locations for the federated authZ and the Service Providers 
+Add the Locations for the federated `authZ` and the Service Providers 
 handlers (again inside the `<VirtualHost *:4990>` instance):
 
 .. code-block:: apacheconf 
@@ -690,5 +688,5 @@ this list of log files you can check for warnings and errors:
 
   - /var/log/apache2/error.log
 
-Needless to say, the more instances of Keystone and Dashboard you have,
-the more urgent become the adoption of a centralyzed syslog solution.
+Needless to say, the more instances of `Keystone` and `Dashboard` you have,
+the more urgent the adoption of a centralyzed syslog solution becomes.