Skip to content

Commit

Permalink
Merge pull request #207 from supertokens/jwks-blog-fix
Browse files Browse the repository at this point in the history
typo fix
  • Loading branch information
nkshah2 authored Oct 24, 2023
2 parents f99ca3c + 407b38a commit 5b99684
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion content/understanding-jwks/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ A JWK consists of a JWK Container Object, which is a JSON object that contains a

## How do JWKS work?

To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an exposed by the Authorization Server known as a “jwks endpoint”.
To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an endpoint exposed by the Authorization Server known as a “jwks endpoint”.

![jwks flow](./jwks-flow.png)

Expand Down

0 comments on commit 5b99684

Please sign in to comment.