Skip to content

Commit 80e06b9

Browse files
Update aspnetcore/security/authentication/configure-jwt-bearer-authentication.md
Co-authored-by: Rick Anderson <[email protected]>
1 parent ec1e833 commit 80e06b9

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

aspnetcore/security/authentication/configure-jwt-bearer-authentication.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -108,17 +108,17 @@ OpenID Connect (OIDC) and OAuth 2.0 provide standardized, secure frameworks for
108108

109109
## Implementing JWT bearer token authentication
110110

111-
The **Microsoft.AspNetCore.Authentication.JwtBearer** Nuget package can be used to validate the JWT bearer tokens.
111+
The [Microsoft.AspNetCore.Authentication.JwtBearer](https://www.nuget.org/packages/Microsoft.AspNetCore.Authentication.JwtBearer) Nuget package can be used to validate the JWT bearer tokens.
112112

113-
JWT bearer tokens should be fully validated in an API.
113+
JWT bearer tokens should be fully validated in an API. The following should be validated:
114114

115-
* The signature should be validated for trust and integrity, i.e. the token was created by the defined secure token service and the token was not tampered with.
116-
* The Issuer claim should be validated and should have the expected value.
117-
* The Audience claim should be validated and should have the expected value.
118-
* The token expiration claim should be validated.
119-
* The token type should be validated. (Required in RFC 9068, "at+jwt")
115+
* Signature, for trust and integrity. This ensures the token was created by the designated secure token service and has not been tampered with.
116+
* Issuer claim with the expected value.
117+
* Audience claim with the expected value.
118+
* Token expiration.
119+
* Token type. Required in [RFC 9068](https://datatracker.ietf.org/doc/rfc9068/) (`"application/at+jwt"`)
120120

121-
The following claims are required for OAuth 2.0 access tokens: iss, exp, aud, sub, client_id, iat, jti.
121+
The following claims are required for OAuth 2.0 access tokens: `iss`, `exp`, `aud`, `sub`, `client_id`, `iat, and`jti`.
122122

123123
If any of these claims or values are incorrect, the API should return a 401 response.
124124

0 commit comments

Comments
 (0)