diff --git a/content/understanding-jwks/index.md b/content/understanding-jwks/index.md index 441d8e30..693bf4e9 100644 --- a/content/understanding-jwks/index.md +++ b/content/understanding-jwks/index.md @@ -55,7 +55,7 @@ A JWK consists of a JWK Container Object, which is a JSON object that contains a ## How do JWKS work? -To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an exposed by the Authorization Server known as a “jwks endpoint”. +To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an endpoint exposed by the Authorization Server known as a “jwks endpoint”. ![jwks flow](./jwks-flow.png)