Skip to content

Commit 84e7951

Browse files
author
gitName
committed
work in progress
1 parent 452f4c9 commit 84e7951

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/api-management/validate-azure-ad-token-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
5353
<!-- if there are multiple possible allowed values, then add additional value elements -->
5454
</required-claims>
5555
<decryption-keys>
56-
<key>Base64 encoded signing key | certificate-id="mycertificate"</key>
56+
<key certificate-id="mycertificate"/>
5757
<!-- if there are multiple keys, then add additional key elements -->
5858
</decryption-keys>
5959
</validate-azure-ad-token>
@@ -79,7 +79,7 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
7979
| backend-application-ids | Contains a list of acceptable backend application IDs. This is only required in advanced cases for the configuration of options and can generally be removed. Policy expressions aren't allowed. | No |
8080
| client-application-ids | Contains a list of acceptable client application IDs. If multiple `application-id` elements are present, then each value is tried until either all are exhausted (in which case validation fails) or until one succeeds. If a client application ID isn't provided, one or more `audience` claims should be specified. Policy expressions aren't allowed. | No |
8181
| required-claims | Contains a list of `claim` elements for claim values expected to be present on the token for it to be considered valid. When the `match` attribute is set to `all`, every claim value in the policy must be present in the token for validation to succeed. When the `match` attribute is set to `any`, at least one claim must be present in the token for validation to succeed. Policy expressions are allowed. | No |
82-
| decryption-keys | A list of Base64-encoded keys, in [`key`](#key-attributes) subelements, used to decrypt the tokens. If multiple security keys are present, then each key is tried until either all keys are exhausted (in which case validation fails) or a key succeeds.<br/><br/>To decrypt a token encrypted with an asymmetric key, optionally specify the public key using a `certificate-id` attribute with value set to the identifier of a certificate uploaded to API Management. | No |
82+
| decryption-keys | A list of [`key`](#key-attributes) subelements, used to decrypt a token signed with an asymmetric key. If multiple keys are present, then each key is tried until either all keys are exhausted (in which case validation fails) or a key succeeds.<br/><br/>Specify the public key using a `certificate-id` attribute with value set to the identifier of a certificate uploaded to API Management. | No |
8383

8484
### claim attributes
8585

@@ -92,7 +92,7 @@ The `validate-azure-ad-token` policy enforces the existence and validity of a JS
9292
### key attributes
9393
| Attribute | Description | Required | Default |
9494
| ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -------------------------------------------------------------------------------- | --------------------------------------------------------------------------------- |
95-
| certificate-id | Identifier of a certificate entity [uploaded](/rest/api/apimanagement/apimanagementrest/azure-api-management-rest-api-certificate-entity#Add) to API Management, used to specify the public key to verify a token signed with an asymmetric key. | No | N/A |
95+
| certificate-id | Identifier of a certificate entity [uploaded](/rest/api/apimanagement/apimanagementrest/azure-api-management-rest-api-certificate-entity#Add) to API Management, used to specify the public key to verify a token signed with an asymmetric key. | Yes | N/A |
9696

9797
## Usage
9898

articles/api-management/validate-jwt-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
3838
output-token-variable-name="name of a variable to receive a JWT object representing successfully validated token">
3939
<openid-config url="full URL of the configuration endpoint, for example, https://login.constoso.com/openid-configuration" />
4040
<issuer-signing-keys>
41-
<key>Base64 encoded signing key | certificate-id="mycertificate" | n="modulus" e="exponent"</key>
41+
<key id="kid-claim" certificate-id="mycertificate" n="modulus" e="exponent">Base64 encoded signing key</key>
4242
<!-- if there are multiple keys, then add additional key elements -->
4343
</issuer-signing-keys>
4444
<decryption-keys>
45-
<key>Base64 encoded signing key | certificate-id="mycertificate" | n="modulus" e="exponent" </key>
45+
<key id="kid-claim" certificate-id="mycertificate">Base64 encoded signing key</key>
4646
<!-- if there are multiple keys, then add additional key elements -->
4747
</decryption-keys>
4848
<audiences>

0 commit comments

Comments
 (0)