Skip to content

Commit 8a2c486

Browse files
authored
Update validate-jwt-policy.md
typo
1 parent fd680a7 commit 8a2c486

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/api-management/validate-jwt-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
119119
* If used in the policy, the key must be provided inline within the policy in the Base64-encoded form.
120120
* **Asymmetric** - The following encryption algortithms are supported: PS256, RS256, RS512.
121121
* If used in the policy, the key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
122-
* To configure the policy with one or more OpenID configuration endpoints for use with a self\-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
122+
* To configure the policy with one or more OpenID configuration endpoints for use with a self-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
123123
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Microsoft Entra authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.
124124
* When using a custom header (`header-name`), the configured required scheme (`require-scheme`) will be ignored. To use a required scheme, JWT tokens must be provided in the `Authorization` header.
125125

0 commit comments

Comments
 (0)