Skip to content

Commit 2eebf22

Browse files
committed
solved linter issues
1 parent 5d6618a commit 2eebf22

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

_source/_posts/2026-03-02-universal-logout.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,8 @@ Then, instantiate the Okta JWT Verifier under your UL section. You'll need to in
8181

8282
// Signed Jwt Validation
8383
const oktaJwtVerifier = new OktaJwtVerifier({
84-
issuer: 'https://{yourOktaDomain}.com',
85-
jwksUri: 'https://{yourOktaDomain}.com/oauth2/v1/keys',
84+
issuer: 'https://{yourOktaDomain}',
85+
jwksUri: 'https://{yourOktaDomain}/oauth2/v1/keys',
8686
});
8787
```
8888

@@ -96,8 +96,8 @@ Next, we'll need to create a custom middleware called `tokenValidator` to get th
9696

9797
// Signed Jwt Validation
9898
const oktaJwtVerifier = new OktaJwtVerifier({
99-
issuer: 'https://{yourOktaDomain}.com',
100-
jwksUri: 'https://{yourOktaDomain}.com/oauth2/v1/keys',
99+
issuer: 'https://{yourOktaDomain}',
100+
jwksUri: 'https://{yourOktaDomain}/oauth2/v1/keys',
101101
});
102102

103103
const tokenValidator = async function (req, res, next) {
@@ -396,8 +396,8 @@ app.get('/openid/callback/:id', async (req, res, next) => {
396396
// Universal Logout Route
397397
// Signed Jwt Validation
398398
const oktaJwtVerifier = new OktaJwtVerifier({
399-
issuer: 'https://{yourOktaDomain}.com',
400-
jwksUri: 'https://{yourOktaDomain}.com/oauth2/v1/keys',
399+
issuer: 'https://{yourOktaDomain}',
400+
jwksUri: 'https://{yourOktaDomain}/oauth2/v1/keys',
401401
});
402402
const tokenValidator = async function (req, res, next) {
403403
const authHeaders = req.headers.authorization;
@@ -407,7 +407,7 @@ const tokenValidator = async function (req, res, next) {
407407
const parts = authHeaders.split(' ');
408408
const jwt = parts[1];
409409
const expectedAud =
410-
'https://noble-heterogenetic-clemmie.ngrok-free.dev/global-token-revocation';
410+
'https://{base-URL-provided-by-local-tunnel}/global-token-revocation';
411411
try {
412412
const verifiedJwt = await oktaJwtVerifier.verifyAccessToken(
413413
jwt,
@@ -545,8 +545,8 @@ In addition, we'll need to update the expectedAud to match the base URL provided
545545

546546
// Signed Jwt Validation
547547
const oktaJwtVerifier = new OktaJwtVerifier({
548-
issuer: 'https://{yourOktaDomain}.com',
549-
jwksUri: 'https://{yourOktaDomain}.com/oauth2/v1/keys',
548+
issuer: 'https://{yourOktaDomain}',
549+
jwksUri: 'https://{yourOktaDomain}/oauth2/v1/keys',
550550
});
551551

552552
const tokenValidator = async function (req, res, next) {

0 commit comments

Comments
 (0)