From 407b38a7cc237d42dacdbf59255d49824c492a98 Mon Sep 17 00:00:00 2001 From: Joel Coutinho Date: Tue, 24 Oct 2023 13:20:15 +0530 Subject: [PATCH] typo fix --- content/understanding-jwks/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/understanding-jwks/index.md b/content/understanding-jwks/index.md index 441d8e30..693bf4e9 100644 --- a/content/understanding-jwks/index.md +++ b/content/understanding-jwks/index.md @@ -55,7 +55,7 @@ A JWK consists of a JWK Container Object, which is a JSON object that contains a ## How do JWKS work? -To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an exposed by the Authorization Server known as a “jwks endpoint”. +To make sure a JWT has not been tampered with we need to validate its integrity by verifying the signature. This requires a public key that corresponds to the private key used by the Authorization Server to initially sign the JWT. Typically the JWKS can be retrieved by querying an endpoint exposed by the Authorization Server known as a “jwks endpoint”. ![jwks flow](./jwks-flow.png)