Skip to content
This repository has been archived by the owner on Oct 24, 2024. It is now read-only.

Commit

Permalink
Edited content for clarity
Browse files Browse the repository at this point in the history
OKTA-350677

OKTA-350677
<<<Jenkins Check-In of Tested SHA: 7f868e8 for [email protected]>>>
Artifact: okta-oidc-js
  • Loading branch information
eponsonby authored and eng-prod-CI-bot-okta committed Jan 15, 2021
1 parent 6b1c36a commit 3731bf5
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions packages/jwt-verifier/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ oktaJwtVerifier.verifyAccessToken(accessTokenString, expectedAud)
});
```

The expected audience passed to `verifyAccessToken()` is required, and can be either a string (direct match) or an array strings (the actual `aud` claim in the token must match one of the strings).
The expected audience passed to `verifyAccessToken()` is required, and can be either a string (direct match) or an array of strings (the actual `aud` claim in the token must match one of the strings).

```javascript
// Passing a string for expectedAud
Expand Down Expand Up @@ -148,7 +148,7 @@ const verifier = new OktaJwtVerifier({
});
```

The values you want to assert are included are always represented as an array (the right side of the expression). The claim that you're checking against (the left side of the expression) can have either an array (like `groups`) or a space-separated list in a string (like `scp`) as its value type.
The values you want to assert are always represented as an array (the right side of the expression). The claim that you're checking against (the left side of the expression) can have either an array (like `groups`) or a space-separated list in a string (like `scp`) as its value type.

NOTE: Currently, `.includes` is the only supported claim operator.

Expand All @@ -170,11 +170,11 @@ const oktaJwtVerifier = new OktaJwtVerifier({
```

## Testing
Setup SPA and Web App in your Okta org and testing environment variables by following [Testing](https://github.com/okta/okta-oidc-js#testing) section in okta-oidc-js Monorepo's README.
Set up a SPA and a Web App in your Okta org and testing environment variables by following the [Testing](https://github.com/okta/okta-oidc-js#testing) section in okta-oidc-js Monorepo's README.

**NOTE:**

When create SPA application in your Okta org, please make sure all `Implicit` checks have been checked in `General Settings -> Application -> Allowed grant types` section.
When creating a SPA in your Okta org, please make sure all `Implicit` checks have been checked in the `General Settings -> Application -> Allowed grant types` section.

Command for running unit test:
```
Expand Down

0 comments on commit 3731bf5

Please sign in to comment.