Skip to content

Commit edb221a

Browse files
authored
Merge pull request #86694 from CelesteDG/patch-21
GitHub issue fix
2 parents 32eb521 + 39a5e69 commit edb221a

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

articles/active-directory/develop/access-tokens.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,10 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
15-
ms.date: 04/13/2019
15+
ms.date: 08/28/2019
1616
ms.author: ryanwi
1717
ms.reviewer: hirsin
18-
ms.custom: aaddev
19-
ms.custom: fasttrack-edit
18+
ms.custom: aaddev, fasttrack-edit
2019
ms.collection: M365-identity-device-management
2120
---
2221

@@ -167,7 +166,7 @@ Tokens issued by Azure AD are signed using industry standard asymmetric encrypti
167166
}
168167
```
169168

170-
The `alg` claim indicates the algorithm that was used to sign the token, while the `kid` claim indicates the particular public key that was used to sign the token.
169+
The `alg` claim indicates the algorithm that was used to sign the token, while the `kid` claim indicates the particular public key that was used to validate the token.
171170

172171
At any given point in time, Azure AD may sign an id_token using any one of a certain set of public-private key pairs. Azure AD rotates the possible set of keys on a periodic basis, so your app should be written to handle those key changes automatically. A reasonable frequency to check for updates to the public keys used by Azure AD is every 24 hours.
173172

0 commit comments

Comments
 (0)