Skip to content

Commit 5d7743a

Browse files
authored
Merge pull request #126044 from changeworld/patch-149
Fix typo
2 parents 7a1ce7c + 624e330 commit 5d7743a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/communication-services/how-tos/call-automation/includes/secure-webhook-endpoint-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Each mid-call webhook callback sent by Call Automation uses a signed JSON Web To
3535
```
3636

3737
4. Configure your application to validate the JWT and the configuration of your Azure Communication Services resource. You need the `audience` values as it is present in the JWT payload.
38-
5. Validate the issuer, audience and the JWT token.
38+
5. Validate the issuer, audience and the JWT.
3939
- The audience is your Azure Communication Services resource ID you used to set up your Call Automation client. Refer [here](../../../quickstarts/voice-video-calling/get-resource-id.md) about how to get it.
40-
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT token. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
40+
- The JSON Web Key Set (JWKS) endpoint in the OpenId configuration contains the keys used to validate the JWT. When the signature is valid and the token hasn't expired (within 5 minutes of generation), the client can use the token for authorization.
4141

4242
This sample code demonstrates how to configure OIDC client to validate webhook payload using JWT
4343

0 commit comments

Comments
 (0)