Skip to content

Commit cc351ce

Browse files
authored
Merge pull request #631 from DuendeSoftware/mb/typ
Refine JWT audience validation documentation
2 parents 9d5046b + d6621b2 commit cc351ce

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

  • IdentityServer/v7/docs/content/tokens/authentication

IdentityServer/v7/docs/content/tokens/authentication/jwt.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -181,11 +181,11 @@ The OpenID Foundation proposed a two-part fix: strictly validate the audience an
181181
explicit `typ` header (with value `client-authentication+jwt`) in the authentication JWT.
182182

183183
You can enable strict audience validation using the [**StrictClientAssertionAudienceValidation**]({{< ref "/reference/options/#strict-audience-validation" >}})
184-
flag, which strictly validates that the audience is equal to the issuer and validates the token's
185-
`typ` header.
184+
flag, which always strictly validates that the audience is equal to the issuer and validates the token's
185+
`typ` header, as specified in [RFC 7523 bis](https://datatracker.ietf.org/doc/draft-ietf-oauth-rfc7523bis/).
186186

187-
Validation behavior is determined based on the `typ` header being present.
188-
If the **StrictClientAssertionAudienceValidation** flag is not set but the token sets the `typ`
189-
to `client-authentication+jwt`, then the audience will still be validated strictly.
187+
When **StrictClientAssertionAudienceValidation** is not enabled, validation behavior is determined based
188+
on the `typ` header being present. When the token sets the `typ` header to `client-authentication+jwt`,
189+
IdentityServer assumes the client's intention is to apply strict audience validation.
190190
If `typ` is not present, [default audience validation]({{< ref "/apis/aspnetcore/jwt/#adding-audience-validation" >}})
191191
is used.

0 commit comments

Comments
 (0)