Skip to content

Commit e5d19cc

Browse files
committed
stash
1 parent c8a0f3d commit e5d19cc

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

tyk-docs/content/basic-config-and-security/security/authentication-authorization/ext-oauth-middleware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ There could be cases when you don’t need to introspect a JWT access token from
100100
- a base64 encoded static secret
101101
- a valid JWK url in plain text
102102
- a valid JWK url in base64 encoded format
103-
- `issuedAtValidationSkew` , `notBeforeValidationSkew`, `expiresAtValidationSkew` can be used to [configure clock skew]({{< ref "/content/api-management/authentication-authorization#use-json-web-tokens-jwt.md#jwt-clock-skew-configuration" >}}) for json web token validation.
103+
- `issuedAtValidationSkew` , `notBeforeValidationSkew`, `expiresAtValidationSkew` can be used to [configure clock skew]({{< ref "/content//api-management/authentication-authorization#use-json-web-tokens-jwt.md#jwt-clock-skew-configuration" >}}) for json web token validation.
104104
- `identityBaseField` - the identity key name for claims. If empty it will default to `sub`.
105105

106106
### Example: Tyk OAS API definition with JWT validation enabled

tyk-docs/content/basic-config-and-security/security/authentication-authorization/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ aliases:
1717
{{< note success >}}
1818
**Note**
1919

20-
Tyk's dedicated OpenID Connect Authentication middleware will be deprecated from Tyk 5.7.0. Tyk's [JSON Web Token (JWT)]({{< ref "/api-management/authentication-authorization#use-json-web-tokens-jwt#about-jwts" >}}) authentication method also allows you to integrate with an OIDC provider, so the dedicated OIDC middleware will be deprecated to reduce duplication and potential for misconfiguration.
20+
Tyk's dedicated OpenID Connect Authentication middleware will be deprecated from Tyk 5.7.0. Tyk's [JSON Web Token (JWT)]({{< ref "basic-config-and-security/security/authentication-authorization/json-web-tokens#about-jwts" >}}) authentication method also allows you to integrate with an OIDC provider, so the dedicated OIDC middleware will be deprecated to reduce duplication and potential for misconfiguration.
2121
{{< /note >}}
2222

2323

24-
[OpenID Connect](https://openid.net/developers/how-connect-works) (OIDC) builds on top of OAuth 2.0, adding authentication. You can secure your APIs on Tyk by integrating with any standards compliant OIDC provider using [JSON Web Tokens]({{< ref "/api-management/authentication-authorization#use-json-web-tokens-jwt" >}}) (JWTs).
24+
[OpenID Connect](https://openid.net/developers/how-connect-works) (OIDC) builds on top of OAuth 2.0, adding authentication. You can secure your APIs on Tyk by integrating with any standards compliant OIDC provider using [JSON Web Tokens]({{< ref "basic-config-and-security/security/authentication-authorization/json-web-tokens" >}}) (JWTs).
2525
JWTs offer a simple way to use the third-party Identity Provider (IdP) without needing any direct integration between the Tyk and 3rd-party systems.
2626

2727
To integrate a 3rd party OAuth2/OIDC IdP with Tyk, all you will need to do is ensure that your IdP can issue OAuth2 JWT access tokens as opposed to opaque tokens.

0 commit comments

Comments
 (0)