Skip to content

Commit e00d3fc

Browse files
committed
Polish Resource Server JWT Docs
Issue gh-5935
1 parent 9f97009 commit e00d3fc

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/manual/src/docs/asciidoc/_includes/servlet/oauth2/oauth2-resourceserver.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,12 +77,12 @@ So long as this scheme is indicated, Resource Server will attempt to process the
7777

7878
Given a well-formed JWT, Resource Server will:
7979

80-
1. Validate its signature against a public key obtained from the `jwks_url` endpoint during startup and matched against the JWTs header
81-
2. Validate the JWTs `exp` and `nbf` timestamps and the JWTs `iss` claim, and
80+
1. Validate its signature against a public key obtained from the `jwks_url` endpoint during startup and matched against the JWT
81+
2. Validate the JWT's `exp` and `nbf` timestamps and the JWT's `iss` claim, and
8282
3. Map each scope to an authority with the prefix `SCOPE_`.
8383

8484
[NOTE]
85-
As the authorization server makes available new keys, Spring Security will automatically rotate the keys used to validate the JWT tokens.
85+
As the authorization server makes available new keys, Spring Security will automatically rotate the keys used to validate JWTs.
8686

8787
The resulting `Authentication#getPrincipal`, by default, is a Spring Security `Jwt` object, and `Authentication#getName` maps to the JWT's `sub` property, if one is present.
8888

0 commit comments

Comments
 (0)