Skip to content
This repository was archived by the owner on Apr 13, 2022. It is now read-only.

Commit 27fbc1c

Browse files
jaxoncreeddmitrizagidulin
authored andcommitted
Updated numbers
1 parent 8d9d75b commit 27fbc1c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

application-workflow-detailed.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -475,7 +475,7 @@ Before the RS requests information from the thrid-party OP, it must retrieve its
475475
GET https://secureauth.example/.well-known/openid-configuration
476476
```
477477

478-
#### 7. Requests public keys
478+
#### 8. Requests public keys
479479

480480
Now that we've confirmed the validity of the pop_token and the subject of the identity token, we want to ensure the validity of the id_token it contains. To do so, we need the OP's public keys. The route to retrieve the public keys is listed in the OP Configuration fetched in the previous step. Recall how to retrieve the OP's public keys in steps 7, and 8 of the authorization instructions.
481481

@@ -485,10 +485,10 @@ GET https://secureauth.example/jwks
485485

486486
In order to decrease network usage, RSs SHOULD cache these keys once received and skip this step given keys are already in the cache.
487487

488-
#### 8. Performs Authentication
488+
#### 9. Performs Authentication
489489

490490
With OP public keys obtained, the RS can confirm if the id_token was signed by the OP. If it was not, the RS must reject the request with a 403.
491491

492-
#### 9. Returns Result
492+
#### 10. Returns Result
493493

494494
Given all went well, the RS should return the requested content.

0 commit comments

Comments
 (0)