Skip to content

Commit fd680a7

Browse files
authored
Update validate-jwt-policy.md
edit
1 parent 9c0a9e2 commit fd680a7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/api-management/validate-jwt-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,9 @@ The `validate-jwt` policy enforces existence and validity of a supported JSON we
116116
* The `validate-jwt` policy requires that the `exp` registered claim is included in the JWT token, unless `require-expiration-time` attribute is specified and set to `false`.
117117
* The policy supports both symmetric and asymmetric signing algorithms:
118118
* **Symmetric** - The following encryption algorithms are supported: A128CBC-HS256, A192CBC-HS384, A256CBC-HS512.
119-
* The key must be provided inline within the policy in the Base64-encoded form.
119+
* If used in the policy, the key must be provided inline within the policy in the Base64-encoded form.
120120
* **Asymmetric** - The following encryption algortithms are supported: PS256, RS256, RS512.
121-
* The key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
121+
* If used in the policy, the key may be provided either via an OpenID configuration endpoint, or by providing the ID of an uploaded certificate (in PFX format) that contains the public key, or the modulus-exponent pair of the public key.
122122
* To configure the policy with one or more OpenID configuration endpoints for use with a self\-hosted gateway, the OpenID configuration endpoints URLs must also be reachable by the cloud gateway.
123123
* You can use access restriction policies in different scopes for different purposes. For example, you can secure the whole API with Microsoft Entra authentication by applying the `validate-jwt` policy on the API level, or you can apply it on the API operation level and use `claims` for more granular control.
124124
* When using a custom header (`header-name`), the configured required scheme (`require-scheme`) will be ignored. To use a required scheme, JWT tokens must be provided in the `Authorization` header.

0 commit comments

Comments
 (0)