Skip to content

Commit 77612c7

Browse files
authored
Fix typo in configure-jwt-bearer-authentication.md (#36103)
1 parent 137a70d commit 77612c7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

aspnetcore/security/authentication/configure-jwt-bearer-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ When using access tokens in a client application, the access tokens need to be r
268268
`SaveTokens` will not currently refresh access tokens automatically, but this functionality is planned for .NET 10. Follow https://github.com/dotnet/aspnetcore/issues/8175 for updates. In the meantime, you can manually refresh the access token as [demonstrated in the Blazor Web App with OIDC documentation](/aspnet/core/blazor/security/blazor-web-app-with-oidc?pivots=with-bff-pattern#token-refresh) or use a third-party NuGet package like [Duende.AccessTokenManagement.OpenIdConnect](https://www.nuget.org/packages/Duende.AccessTokenManagement.OpenIdConnect) for handling and managing access tokens in the client app. For more information, see [Duende token management](https://docs.duendesoftware.com/identityserver/v7/quickstarts/3a_token_management/).
269269
270270
> [!NOTE]
271-
> If deploying to production, the cache should work in a mutli-instance deployment. A persistent cache is normally required.
271+
> If deploying to production, the cache should work in a multi-instance deployment. A persistent cache is normally required.
272272

273273
Some secure token servers encrypt the access tokens. Access tokens do not require any format. When using OAuth introspection, a reference token is used instead of an access token. A client (UI) application should never open an access token as the access token is not intended for this. Only an API for which the access token was created for should open the access token.
274274

0 commit comments

Comments
 (0)