This is an automated email from the ASF dual-hosted git repository.

wenming pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix.git


The following commit(s) were added to refs/heads/master by this push:
     new d599d20c2 docs: update jwt-auth docs (#11785)
d599d20c2 is described below

commit d599d20c25cc3ca275da27d1174398d9e1d91fd5
Author: Michele Righi <[email protected]>
AuthorDate: Thu Dec 5 10:29:16 2024 +0100

    docs: update jwt-auth docs (#11785)
---
 docs/en/latest/plugins/jwt-auth.md | 14 +++++++-------
 docs/zh/latest/plugins/jwt-auth.md |  1 +
 2 files changed, 8 insertions(+), 7 deletions(-)

diff --git a/docs/en/latest/plugins/jwt-auth.md 
b/docs/en/latest/plugins/jwt-auth.md
index 1f8f47092..38fab4e87 100644
--- a/docs/en/latest/plugins/jwt-auth.md
+++ b/docs/en/latest/plugins/jwt-auth.md
@@ -47,18 +47,18 @@ For Consumer:
 | exp           | integer | False                                              
   | 86400   | [1,...]                     | Expiry time of the token in 
seconds.                                                                        
                                                                                
|
 | base64_secret | boolean | False                                              
   | false   |                             | Set to true if the secret is 
base64 encoded.                                                                 
                                                                               |
 | lifetime_grace_period | integer | False                                      
   | 0       | [0,...]                     | Define the leeway in seconds to 
account for clock skew between the server that generated the jwt and the server 
validating it. Value should be zero (0) or a positive integer. |
-| key_claim_name | string | False                                              
   | key     |                             | The name of the JWT claim that 
contains the user key (corresponds to Consumer's key attribute). |
 
 NOTE: `encrypt_fields = {"secret"}` is also defined in the schema, which means 
that the field will be stored encrypted in etcd. See [encrypted storage 
fields](../plugin-develop.md#encrypted-storage-fields).
 
 For Route:
 
-| Name   | Type   | Required | Default       | Description                     
                                    |
-|--------|--------|----------|---------------|---------------------------------------------------------------------|
-| header | string | False    | authorization | The header to get the token 
from.                                   |
-| query  | string | False    | jwt           | The query string to get the 
token from. Lower priority than header. |
-| cookie | string | False    | jwt           | The cookie to get the token 
from. Lower priority than query.        |
-| hide_credentials | boolean | False     | false  | Set to true will not pass 
the authorization request of header\query\cookie to the Upstream.|
+| Name             | Type    | Required | Default       | Description          
                                                                           |
+|------------------|---------|----------|---------------|-------------------------------------------------------------------------------------------------|
+| header           | string  | False    | authorization | The header to get 
the token from.                                                               |
+| query            | string  | False    | jwt           | The query string to 
get the token from. Lower priority than header.                             |
+| cookie           | string  | False    | jwt           | The cookie to get 
the token from. Lower priority than query.                                    |
+| hide_credentials | boolean | False    | false         | Set to true will not 
pass the authorization request of header\query\cookie to the Upstream.     |
+| key_claim_name   | string  | False    | key           | The name of the JWT 
claim that contains the user key (corresponds to Consumer's key attribute). |
 
 You can implement `jwt-auth` with [HashiCorp 
Vault](https://www.vaultproject.io/) to store and fetch secrets and RSA keys 
pairs from its [encrypted KV 
engine](https://developer.hashicorp.com/vault/docs/secrets/kv) using the 
[APISIX Secret](../terminology/secret.md) resource.
 
diff --git a/docs/zh/latest/plugins/jwt-auth.md 
b/docs/zh/latest/plugins/jwt-auth.md
index 88065cb50..6c848aa3d 100644
--- a/docs/zh/latest/plugins/jwt-auth.md
+++ b/docs/zh/latest/plugins/jwt-auth.md
@@ -58,6 +58,7 @@ Route 端:
 | query  | string | 否     | jwt           | 设置我们从哪个 query string 获取 
token,优先级低于 header。  |
 | cookie | string | 否     | jwt           | 设置我们从哪个 cookie 获取 token,优先级低于 
query。        |
 | hide_credentials | boolean | 否     | false  | 该参数设置为 `true` 时,则不会将含有认证信息的 
header\query\cookie 传递给 Upstream。|
+| key_claim_name | string  | 否     | key           | 包含用户密钥(对应消费者的密钥属性)的 JWT 
声明的名称。|
 
 您可以使用 [HashiCorp Vault](https://www.vaultproject.io/) 实施 `jwt-auth`,以从其[加密的 KV 
引擎](https://developer.hashicorp.com/vault/docs/secrets/kv) 使用 [APISIX 
Secret](../terminology/secret.md) 资源。
 

Reply via email to