Skip to content
This repository was archived by the owner on May 31, 2022. It is now read-only.

Commit c0d1512

Browse files
wondeejzheaux
authored andcommitted
Fix documenation for matching autoconfiguration prefix; #200
1 parent 85e7c47 commit c0d1512

File tree

1 file changed

+28
-33
lines changed

1 file changed

+28
-33
lines changed

docs/src/docs/asciidoc/index.adoc

Lines changed: 28 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -679,12 +679,11 @@ To indicate JWT, simply specify the JWK Set Uri hosted on your Authorization Ser
679679
====
680680
[source,yaml]
681681
----
682-
spring:
683-
security:
684-
oauth2:
685-
resource:
686-
jwk:
687-
key-set-uri: https://idp.example.com/.well-known/jwks.json
682+
security:
683+
oauth2:
684+
resource:
685+
jwk:
686+
key-set-uri: https://idp.example.com/.well-known/jwks.json
688687
----
689688
====
690689

@@ -699,11 +698,10 @@ To indicate opaque, simply specify the Authorization Server endpoint that knows
699698
====
700699
[source,yaml]
701700
----
702-
spring:
703-
security:
704-
oauth2:
705-
resource:
706-
token-info-uri: https://idp.example.com/oauth2/introspect
701+
security:
702+
oauth2:
703+
resource:
704+
token-info-uri: https://idp.example.com/oauth2/introspect
707705
----
708706
====
709707

@@ -756,15 +754,14 @@ Configuring the resource server with the appropriate symmetric key or PKCS#8 PEM
756754
====
757755
[source,yaml]
758756
----
759-
spring:
760-
security:
761-
oauth2:
762-
resource:
763-
jwt:
764-
key-value: |
765-
-----BEGIN PUBLIC KEY-----
766-
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC...
767-
-----END PUBLIC KEY-----
757+
security:
758+
oauth2:
759+
resource:
760+
jwt:
761+
key-value: |
762+
-----BEGIN PUBLIC KEY-----
763+
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC...
764+
-----END PUBLIC KEY-----
768765
----
769766
====
770767

@@ -784,14 +781,13 @@ Instead, you'll need to specify credentials that represent this client, like so:
784781
====
785782
[source,yaml]
786783
----
787-
spring:
788-
security:
789-
oauth2:
790-
client:
791-
clientId: client-id
792-
clientSecret: client-secret
793-
resource:
794-
tokenInfoUri: https://idp.example.com/oauth2/check_token
784+
security:
785+
oauth2:
786+
client:
787+
clientId: client-id
788+
clientSecret: client-secret
789+
resource:
790+
tokenInfoUri: https://idp.example.com/oauth2/check_token
795791
----
796792
====
797793

@@ -809,11 +805,10 @@ If you specify a user info endpoint like so:
809805
====
810806
[source,yaml]
811807
----
812-
spring:
813-
security:
814-
oauth2:
815-
resource:
816-
userInfoUri: https://idp.example.com/oauth2/userinfo
808+
security:
809+
oauth2:
810+
resource:
811+
userInfoUri: https://idp.example.com/oauth2/userinfo
817812
----
818813
====
819814

0 commit comments

Comments
 (0)