diff --git a/Gazelle-STS/installation.md b/Gazelle-STS/installation.md
index f59159a869de5d7c423e268389e44279ade3ca48..146edebc60839250c35a3920a46e81fb58d49fb1 100755
--- a/Gazelle-STS/installation.md
+++ b/Gazelle-STS/installation.md
@@ -73,12 +73,19 @@ _Port could also be different whether you have modified the JBoss configuration.
 
 ## Configuration
 
-By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at `/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at [https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator).
-
-This configuration can be overridden. Download the config archive from our Nexus repository [gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**). Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content.
-As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related to assertions such as namespaces, roles, organization, etc. 
-
-Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as issuer will be inconsistant with the private key used to sign the assertion.
+By default, the project is configured for working in **gazelle.ihe.net** environment. The keystore used to sign assertions must be located at 
+`/opt/sts/keystore.jks`, the privateKeyEntry must have the alias `tomcat`, and the certificate validator webservice must be reachable at 
+[https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator](https://gazelle.ihe.net/gazelle-atna-ejb/CertificateValidatorService/CertificateValidator).
+
+This configuration can be overridden. Download the config archive from our Nexus repository 
+[gazelle-sts releases](https://gazelle.ihe.net/nexus/index.html#nexus-search;quick~gazelle-sts-service) (search for **gazelle-sts-service-X.X.X-config.zip**). 
+Then unzip the archive, copy the file picketlink-sts.xml under `/opt/sts/` and edit its content.
+As well, the zip archive contains 2 property files named 'ihe.assertion.properties' and 'sequoia.assertion.properties' containing properties related 
+to assertions such as namespaces, roles, organization, etc. These properties files shall also be copied in `/opt/sts/`. The content may also be edited
+to adjust values for defined properties.
+
+Note: The property `X509CERTIFICATE` of the `KeyProvider` must stay equals to the `SigningKeyAlias` property, otherwise the public key declared as 
+issuer will be inconsistant with the private key used to sign the assertion.
 
 ## Sequoia configurations
 Some special configurations have defined in the source code for the Sequoia project.