Skip to content

Commit d5a6f00

Browse files
authored
docs: use jwt.ms link for inspecting token (#1552)
Signed-off-by: Anish Ramasekar <[email protected]>
1 parent 9e0403a commit d5a6f00

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/book/src/topics/self-managed-clusters/service-account-key-rotation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ Output the projected service account token:
164164
kubectl exec dummy-pod -- cat /var/run/secrets/azure/tokens/azure-identity-token
165165
```
166166

167-
Decode your token using [jwt.io][3]. The `kid` field in the token header should be the same as the `kid` of `azwi jwks --public-keys sa-new.pub | jq -r '.keys[0].kid'`. This means that the service account token is signed by the new private key.
167+
Decode your token using [jwt.ms][3]. The `kid` field in the token header should be the same as the `kid` of `azwi jwks --public-keys sa-new.pub | jq -r '.keys[0].kid'`. This means that the service account token is signed by the new private key.
168168

169169
### 6. Cleanup
170170

@@ -208,6 +208,6 @@ rm sa.*
208208

209209
[2]: ../../quick-start.md
210210

211-
[3]: https://jwt.io/
211+
[3]: https://jwt.ms
212212

213213
[4]: https://github.com/Azure/azure-workload-identity/releases

0 commit comments

Comments
 (0)