Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 672acfc

Browse files
Further explain the impact of using custom signing key
1 parent cfa8982 commit 672acfc

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

use-cases/azure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,9 @@ Choose a role (only a single role can be selected at a time), click on the **Sel
126126

127127
You do not need to create a custom signing key for your application. If you create one though, you must append an `appid` query parameter containing the *app ID* to the `jwks_uri`.
128128

129-
For example `https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration?appid=<my-app-id>` contains a `jwks_uri` of `https://login.microsoftonline.com/{tenant}/discovery/keys?appid=<my-app-id>`.
129+
For example, if you try `https://login.microsoftonline.com/{tenant}/.well-known/openid-configuration?appid=<my-app-id>` it returns a `jwks_uri` with the value `https://login.microsoftonline.com/{tenant}/discovery/keys?appid=<my-app-id>`.
130+
131+
If you do not use the above `jwks_uri`, the standard jwks_uri will not return your custom signing key and RabbitMQ will not be able to find the signing key to validate the token's signature.
130132

131133
## Configure RabbitMQ to use Azure AD as OAuth 2.0 authentication backend
132134

0 commit comments

Comments
 (0)