Skip to content

Commit 6bac99d

Browse files
authored
Merge pull request quarkusio#47577 from rolfedh/make-ids-unique
Make these ids unique
2 parents ecfd585 + 479bba4 commit 6bac99d

File tree

3 files changed

+24
-25
lines changed

3 files changed

+24
-25
lines changed

docs/src/main/asciidoc/security-oidc-bearer-token-authentication.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -359,7 +359,7 @@ public class IssuerValidator implements ContainerRequestFilter {
359359
Consider using the `quarkus.oidc.token.audience` property to verify the token `aud` (`audience`) claim value.
360360
====
361361

362-
[[jose4j-validator]]
362+
[[jose4j-validator-bearer]]
363363
=== Jose4j Validator
364364

365365
You can register a custom https://www.javadoc.io/doc/org.bitbucket.b_c/jose4j/latest/org/jose4j/jwt/consumer/class-use/Validator.html[Jose4j Validator] to customize the JWT claim verification process, before `org.eclipse.microprofile.jwt.JsonWebToken` is initialized.
@@ -1315,7 +1315,7 @@ Quarkus `web-app` applications always require the `quarkus.oidc.client-id` prope
13151315

13161316
https://datatracker.ietf.org/doc/html/rfc9449[RFC9449] describes a Demonstrating Proof of Possession (DPoP) mechanism for cryprographically binding an access token to the current client, preventing the access token loss and replay.
13171317

1318-
Single page application (SPA) public clients generate DPoP proof tokens and use them to acquire and submit access tokens which are cryptograhically bound to DPoP proofs.
1318+
Single page application (SPA) public clients generate DPoP proof tokens and use them to acquire and submit access tokens which are cryptograhically bound to DPoP proofs.
13191319

13201320
Enabling DPoP support in Quarkus requires a single property.
13211321

@@ -1672,7 +1672,7 @@ It is also possible to enforce the required authentication level for an OIDC ten
16721672
quarkus.oidc.hr.token.required-claims.acr=myACR
16731673
----
16741674

1675-
Or, if you need more flexibility, write a <<jose4j-validator>>:
1675+
Or, if you need more flexibility, write a <<jose4j-validator-bearer>>:
16761676

16771677
[source,java]
16781678
----

docs/src/main/asciidoc/security-oidc-code-flow-authentication.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -794,10 +794,10 @@ For more information about using the default token cache or registering a custom
794794
For information about the claim verification, including the `iss` (issuer) claim, see the xref:security-oidc-bearer-token-authentication.adoc#bearer-token-jwt-claim-verification[JSON Web Token claim verification] section.
795795
It applies to ID tokens and also to access tokens in a JWT format, if the `web-app` application has requested the access token verification.
796796

797-
[[jose4j-validator]]
797+
[[jose4j-validator-code]]
798798
==== Jose4j Validator
799799

800-
You can register a custom Jose4j Validator to customize the JWT claim verification process. See the xref:security-oidc-bearer-token-authentication.adoc#jose4j-validator[Jose4j] section for more information.
800+
You can register a custom Jose4j Validator to customize the JWT claim verification process. See the xref:security-oidc-bearer-token-authentication.adoc#jose4j-validator-bearer[Jose4j] section for more information.
801801

802802
=== Proof Key for Code Exchange (PKCE)
803803

0 commit comments

Comments
 (0)