diff --git a/src/doc/specification/Authentication.rst b/src/doc/specification/Authentication.rst
index 0d3da0e19d357808caa5fe2c9a29166196c5a9b1..3fcd25dad0d7fb9e591e1d4a2d845b3d353fff8b 100644
--- a/src/doc/specification/Authentication.rst
+++ b/src/doc/specification/Authentication.rst
@@ -23,12 +23,18 @@ password:
 Logout
 ------
 
+The server does not invalidate AuthTokens. They invalidate after they expire or
+when the server is being restartet. Client should just delete their AuthToken
+to 'logout'.
+
+However, in order to remove the AuthToken cookie from the browsers there is a
+convenient resource which will invalidate the cookie (not the AuthToken).
+
 Send
 
 ``GET http://host:port/logout``
 
-with a valid AuthToken cookie. No new AuthToken will be returned and no AuthToken with that session
-will be accepted anymore.
+and the server will return an empty AuthToken cookie which immediately expires.
 
 Example using ``curl``
 ----------------------
@@ -65,19 +71,3 @@ To use the cookie, pass it on with later requests:
 .. code-block:: sh
 
    curl -X GET -b cookie.txt --insecure "https://<SERVER>/Entity/123"
-
-.. _curl-logout:
-
-Logout
-~~~~~~
-
-The server does not invalidate AuthTokens. They invalidate after they expire of
-when the server is being restartet. Client should just delete their AuthToken
-to 'logout'.
-
-However, in order to remove the AuthToken cookie from the browsers there is a
-convenient resource which will invalidate the cookie (not the AuthToken).
-
-.. code-block:: sh
-
-   curl -X GET -b cookie.txt --insecure "https://<SERVER>/logout"  # Now the cookie is invalidated.