Skip to content

Commit 1d69a00

Browse files
committed
Styling fox for > [!NOTE]
1 parent d80af0a commit 1d69a00

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

aspnetcore/security/authentication/configure-jwt-bearer-authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ There are many types of tokens, including access and ID tokens, as specified by
7979

8080
When using JWT access tokens for API authorization, the API grants or denies access based on the provided token. If the request is not authorized, a 401 or 403 response is returned. The API shouldn't redirect the user to the identity provider to obtain a new token or request additional permissions. The app consuming the API is responsible for acquiring an appropriate token. This ensures a clear separation of concerns between the API (authorization) and the consuming client app (authentication).
8181

82-
> Note
82+
> [!NOTE]
8383
> HTTP also allows returning 404 for not authorized, so as to not leak information about the existence of resources to unauthorized clients.
8484
8585
### 401 Unauthorized
@@ -90,8 +90,8 @@ A 401 Unauthorized response indicates that the provided access token doesn't mee
9090
* **Expiration**: The token has expired and is no longer valid.
9191
* **Incorrect claims**: Critical claims within the token, such as the audience (`aud`) or issuer (`iss`), are missing or invalid.
9292

93-
> Note: From the HTTP Semantics [RFC 9110](https://datatracker.ietf.org/doc/html/rfc9110#section-15.5.2):
94-
> The server generating a 401 response MUST send a WWW-Authenticate header field (Section 11.6.1) containing at least one challenge applicable to the target resource.
93+
> [!NOTE]
94+
> From the HTTP Semantics [RFC 9110](https://datatracker.ietf.org/doc/html/rfc9110#section-15.5.2): The server generating a 401 response MUST send a WWW-Authenticate header field (Section 11.6.1) containing at least one challenge applicable to the target resource.
9595
9696
The [OAuth specifications](/entra/identity-platform/access-token-claims-reference) provide detailed guidelines on the required claims and their validation.
9797

@@ -258,7 +258,7 @@ This approach is not difficult to implement but the access token has access to b
258258

259259
This is easy to implement but the client application has full application access and not a delegated access token. The token should be cached in the client API application.
260260

261-
> Note
261+
> [!NOTE]
262262
> Any app-to-app security also works. Certificate authentication, or in Azure, a managed identity can be used.
263263

264264
## Handling access tokens

0 commit comments

Comments
 (0)