@@ -26,8 +26,8 @@ option (udpa.annotations.file_status).package_version_status = ACTIVE;
26
26
27
27
// Please see following for JWT authentication flow:
28
28
//
29
- // * `JSON Web Token (JWT) <https://tools .ietf.org/html/rfc7519>`_
30
- // * `The OAuth 2.0 Authorization Framework <https://tools .ietf.org/html/rfc6749>`_
29
+ // * `JSON Web Token (JWT) <https://datatracker .ietf.org/doc /html/rfc7519>`_
30
+ // * `The OAuth 2.0 Authorization Framework <https://datatracker .ietf.org/doc /html/rfc6749>`_
31
31
// * `OpenID Connect <http://openid.net/connect>`_
32
32
//
33
33
// A JwtProvider message specifies how a JSON Web Token (JWT) can be verified. It specifies:
@@ -59,7 +59,7 @@ message JwtProvider {
59
59
option (udpa.annotations.versioning ).previous_message_type =
60
60
"envoy.config.filter.http.jwt_authn.v2alpha.JwtProvider" ;
61
61
62
- // Specify the `principal <https://tools .ietf.org/html/rfc7519#section-4.1.1>`_ that issued
62
+ // Specify the `principal <https://datatracker .ietf.org/doc /html/rfc7519#section-4.1.1>`_ that issued
63
63
// the JWT, usually a URL or an email address.
64
64
//
65
65
// It is optional. If specified, it has to match the *iss* field in JWT.
@@ -81,7 +81,7 @@ message JwtProvider {
81
81
//
82
82
string issuer = 1 ;
83
83
84
- // The list of JWT `audiences <https://tools .ietf.org/html/rfc7519#section-4.1.3>`_ are
84
+ // The list of JWT `audiences <https://datatracker .ietf.org/doc /html/rfc7519#section-4.1.3>`_ are
85
85
// allowed to access. A JWT containing any of these audiences will be accepted. If not specified,
86
86
// will not check audiences in the token.
87
87
//
@@ -95,7 +95,7 @@ message JwtProvider {
95
95
//
96
96
repeated string audiences = 2 ;
97
97
98
- // `JSON Web Key Set (JWKS) <https://tools .ietf.org/html/rfc7517#appendix-A>`_ is needed to
98
+ // `JSON Web Key Set (JWKS) <https://datatracker .ietf.org/doc /html/rfc7517#appendix-A>`_ is needed to
99
99
// validate signature of a JWT. This field specifies where to fetch JWKS.
100
100
oneof jwks_source_specifier {
101
101
option (validate.required ) = true ;
@@ -146,11 +146,11 @@ message JwtProvider {
146
146
// If no explicit location is specified, the following default locations are tried in order:
147
147
//
148
148
// 1. The Authorization header using the `Bearer schema
149
- // <https://tools .ietf.org/html/rfc6750#section-2.1>`_. Example::
149
+ // <https://datatracker .ietf.org/doc /html/rfc6750#section-2.1>`_. Example::
150
150
//
151
151
// Authorization: Bearer <token>.
152
152
//
153
- // 2. `access_token <https://tools .ietf.org/html/rfc6750#section-2.3>`_ query parameter.
153
+ // 2. `access_token <https://datatracker .ietf.org/doc /html/rfc6750#section-2.3>`_ query parameter.
154
154
//
155
155
// Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations
156
156
// its provider specified or from the default locations.
0 commit comments