You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/azure.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,7 +126,9 @@ Choose a role (only a single role can be selected at a time), click on the **Sel
126
126
127
127
You do not need to create a custom signing key for your application. If you create one though, you must append an `appid` query parameter containing the *app ID* to the `jwks_uri`.
128
128
129
-
For example `https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration?appid=<my-app-id>` contains a `jwks_uri` of `https://login.microsoftonline.com/{tenant}/discovery/keys?appid=<my-app-id>`.
129
+
For example, if you try `https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration?appid=<my-app-id>` it returns a `jwks_uri` with the value `https://login.microsoftonline.com/{tenant}/discovery/keys?appid=<my-app-id>`.
130
+
131
+
If you do not use the above `jwks_uri`, the standard jwks_uri will not return your custom signing key and RabbitMQ will not be able to find the signing key to validate the token's signature.
130
132
131
133
## Configure RabbitMQ to use Azure AD as OAuth 2.0 authentication backend
0 commit comments