We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 2b2a285 commit 42b9c60Copy full SHA for 42b9c60
1 file changed
IdentityServer/v7/docs/content/tokens/authentication/jwt.md
@@ -178,7 +178,7 @@ contains, and can fool the Relying Party into creating authentication JWTs for t
178
a victim OpenID Provider.
179
180
The OpenID Foundation proposed a two-part fix: strictly validate the audience and set an
181
-explicit `typ` header in the authentication JWT.
+explicit `typ` header (with value `client-authentication+jwt`) in the authentication JWT.
182
183
You can enable strict audience validation using the [**StrictClientAssertionAudienceValidation**]({{< ref "/reference/options/#DUENDEPREVIEW002" >}})
184
flag, which strictly validates that the audience is equal to the issuer and validates the token's
0 commit comments