Skip to content

Commit af97081

Browse files
Address suggested edits
1 parent f8c1c7c commit af97081

8 files changed

+52
-64
lines changed
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# JSON Web Token generation without revoking existing tokens
1+
# Generate JSON Web Tokens without revoking existing tokens
22

33
!!! note
44
Instead of configuring the **JSON Web Token (JWT)** token in the
@@ -12,19 +12,17 @@
1212

1313
![jwt-token-issuer]({{base_path}}/assets/img/guides/jwt-token-issuer.png)
1414

15-
When WSO2 Identity Server receives a request to generate a new JWT, it issues a token based on the **application, user, scope, and binding** combination. If the server receives another request for the same combination, it revokes the existing token and returns a new one.
15+
When WSO2 Identity Server receives a request to generate a new JSON Web Token (JWT), it issues a token based on the application, user, scope, and binding combination. If the server receives another request for the same combination, it revokes the existing token and returns a new one.
1616

17-
If you want to generate a JWT without revoking the existing token,
18-
add and configure the following property in the `deployment.toml` file found in the `<IS_HOME>/repository/conf` folder.
17+
If you want to generate a JWT without revoking the existing token, add and configure the following property in the `<IS_HOME>/repository/conf/deployment.toml` file.
1918

2019
```toml
2120
[oauth.jwt.renew_token_without_revoking_existing]
2221
enable = true
2322
```
2423

2524
!!! Note
26-
This feature support token requests with the `client_crendetials` grant type by default. If you need to enable for
27-
other grant types, add the following configuration to `deployment.toml` file.
25+
This feature supports token requests with the `client_crendetials` grant type by default. If you need to enable for other grant types, add the following configuration to the same `<IS_HOME>/repository/conf/deployment.toml` file.
2826

2927
```toml
3028
[oauth.jwt.renew_token_without_revoking_existing]
@@ -33,6 +31,4 @@ enable = true
3331
```
3432

3533
!!! Warning
36-
Enabling this feature could lead to an exponential growth of tokens.
37-
Make sure to configure token clean up scripts with proper time limits.
38-
See [Remove Unused Tokens from the Database](../../../deploy/remove-unused-tokens-from-the-database/) for details.
34+
Enabling this feature could lead to an exponential growth of tokens. Make sure to configure token clean up scripts with proper time limits. See [Remove Unused Tokens from the Database]({{base_path}}/deploy/remove-unused-tokens-from-the-database/) for details.

en/identity-server/6.1.0/mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ nav:
219219
- OAuth 2.0 Token Hashing: guides/access-delegation/oauth-token-hashing.md
220220
- Revoke OAuth Tokens: guides/access-delegation/oauth-token-revocation.md
221221
- Mutual TLS for OAuth clients: guides/access-delegation/mutual-tls-for-oauth-clients.md
222-
- JWT Token generation without revoking existing tokens: guides/access-delegation/jwt-token-generation-without-revoking-existing-tokens.md
222+
- Generate JWT tokens without revoking existing tokens: guides/access-delegation/generate-jwt-tokens-without-revoking-existing-tokens.md
223223
- Consent Management:
224224
- Manage user consent: guides/consent-mgt/manage-user-consent.md
225225
- Manage consent puposes: guides/consent-mgt/manage-consent-purposes.md
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Generate JSON Web Tokens without revoking existing tokens
2+
3+
When WSO2 Identity Server receives a request to generate a new JSON Web Token (JWT), it issues a token based on the application, user, scope, and binding combination. If the server receives another request for the same combination, it revokes the existing token and returns a new one.
4+
5+
If you want to generate a JWT without revoking the existing token, add and configure the following property in the `<IS_HOME>/repository/conf/deployment.toml` file.
6+
7+
```toml
8+
[oauth.jwt.renew_token_without_revoking_existing]
9+
enable = true
10+
```
11+
12+
!!! Note
13+
This feature supports token requests with the `client_crendetials` grant type by default. If you need to enable for other grant types, add the following configuration to the same `<IS_HOME>/repository/conf/deployment.toml` file.
14+
15+
```toml
16+
[oauth.jwt.renew_token_without_revoking_existing]
17+
enable = true
18+
allowed_grant_types = ["client_credentials","password", ...]
19+
```
20+
21+
!!! Warning
22+
Enabling this feature could lead to an exponential growth of tokens. Make sure to configure token clean up scripts with proper time limits. See [Remove Unused Tokens from the Database]({{base_path}}/deploy/remove-unused-tokens-from-the-database/) for details.

en/identity-server/7.0.0/docs/deploy/jwt-token-generation-without-revoking-existing-tokens.md

Lines changed: 0 additions & 26 deletions
This file was deleted.

en/identity-server/7.0.0/mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -746,7 +746,7 @@ nav:
746746
- Token persistence: deploy/token-persistence.md
747747
- Remove unused tokens from the database: deploy/remove-unused-tokens-from-the-database.md
748748
- Enable assertions in access tokens: deploy/enable-assertions-in-access-tokens.md
749-
- JWT token generation without revoking existing tokens: deploy/jwt-token-generation-without-revoking-existing-tokens.md
749+
- Generate JWT tokens without revoking existing tokens: deploy/generate-jwt-tokens-without-revoking-existing-tokens.md
750750
#- Configure rsync for Deployment Synchronization: deploy/configuring-rsync-for-deployment-synchronization.md
751751
- Enable hostname verification: deploy/enable-hostname-verification.md
752752
- Transport Level Security:
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# Generate JSON Web Tokens without revoking existing tokens
2+
3+
When WSO2 Identity Server receives a request to generate a new JSON Web Token (JWT), it issues a token based on the application, user, scope, and binding combination. If the server receives another request for the same combination, it revokes the existing token and returns a new one.
4+
5+
If you want to generate a JWT without revoking the existing token, add and configure the following property in the `<IS_HOME>/repository/conf/deployment.toml` file.
6+
7+
```toml
8+
[oauth.jwt.renew_token_without_revoking_existing]
9+
enable = true
10+
```
11+
12+
!!! Note
13+
This feature supports token requests with the `client_crendetials` grant type by default. If you need to enable for other grant types, add the following configuration to the same `<IS_HOME>/repository/conf/deployment.toml` file.
14+
15+
```toml
16+
[oauth.jwt.renew_token_without_revoking_existing]
17+
enable = true
18+
allowed_grant_types = ["client_credentials","password", ...]
19+
```
20+
21+
!!! Warning
22+
Enabling this feature could lead to an exponential growth of tokens. Make sure to configure token clean up scripts with proper time limits. See [Remove Unused Tokens from the Database]({{base_path}}/deploy/remove-unused-tokens-from-the-database/) for details.

en/identity-server/7.1.0/docs/deploy/jwt-token-generation-without-revoking-existing-tokens.md

Lines changed: 0 additions & 26 deletions
This file was deleted.

en/identity-server/7.1.0/mkdocs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -819,7 +819,7 @@ nav:
819819
- Token persistence: deploy/token-persistence.md
820820
- Remove unused tokens from the database: deploy/remove-unused-tokens-from-the-database.md
821821
- Enable assertions in access tokens: deploy/enable-assertions-in-access-tokens.md
822-
- JWT token generation without revoking existing tokens: deploy/jwt-token-generation-without-revoking-existing-tokens.md
822+
- Generate JWT tokens without revoking existing tokens: deploy/generate-jwt-tokens-without-revoking-existing-tokens.md
823823
#- Configure rsync for Deployment Synchronization: deploy/configuring-rsync-for-deployment-synchronization.md
824824
- Enable hostname verification: deploy/enable-hostname-verification.md
825825
- Transport Level Security:

0 commit comments

Comments
 (0)