Skip to content

Commit 68bd84f

Browse files
fix JWT claim based routing doc (#2918)
1 parent 708fbc7 commit 68bd84f

File tree

5 files changed

+20
-10
lines changed

5 files changed

+20
-10
lines changed

security/v1/request_authentication.pb.go

Lines changed: 4 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

security/v1/request_authentication.proto

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -295,8 +295,10 @@ option go_package="istio.io/api/security/v1";
295295
// is now supported. A prefix '@' is used to denote a match against internal metadata instead of the headers in the request.
296296
// Currently this feature is only supported for the following metadata:
297297
//
298-
// - `request.auth.claims.{claim-name}[.{sub-claim}]*` which are extracted from validated JWT tokens. The claim name
299-
// currently does not support the `.` character. Examples: `request.auth.claims.sub` and `request.auth.claims.name.givenName`.
298+
// - `request.auth.claims.{claim-name}[.{nested-claim}]*` which are extracted from validated JWT tokens.
299+
// Use the `.` or `[]` as a separator for nested claim names.
300+
// Examples: `request.auth.claims.sub`, `request.auth.claims.name.givenName` and `request.auth.claims[foo.com/name]`.
301+
// For more information, see [JWT claim based routing](https://istio.io/latest/docs/tasks/security/authentication/jwt-route/).
300302
//
301303
// The use of matches against JWT claim metadata is only supported in Gateways. The following example shows:
302304
//

security/v1beta1/request_authentication.pb.go

Lines changed: 4 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

security/v1beta1/request_authentication.pb.html

Lines changed: 4 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

security/v1beta1/request_authentication.proto

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -293,8 +293,10 @@ option go_package="istio.io/api/security/v1beta1";
293293
// is now supported. A prefix '@' is used to denote a match against internal metadata instead of the headers in the request.
294294
// Currently this feature is only supported for the following metadata:
295295
//
296-
// - `request.auth.claims.{claim-name}[.{sub-claim}]*` which are extracted from validated JWT tokens. The claim name
297-
// currently does not support the `.` character. Examples: `request.auth.claims.sub` and `request.auth.claims.name.givenName`.
296+
// - `request.auth.claims.{claim-name}[.{nested-claim}]*` which are extracted from validated JWT tokens.
297+
// Use the `.` or `[]` as a separator for nested claim names.
298+
// Examples: `request.auth.claims.sub`, `request.auth.claims.name.givenName` and `request.auth.claims[foo.com/name]`.
299+
// For more information, see [JWT claim based routing](https://istio.io/latest/docs/tasks/security/authentication/jwt-route/).
298300
//
299301
// The use of matches against JWT claim metadata is only supported in Gateways. The following example shows:
300302
//

0 commit comments

Comments
 (0)