Skip to content

Commit d014b72

Browse files
authored
nic: add docs for sslVerify in JWT policy (#1198)
1 parent c981ad0 commit d014b72

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

content/nic/configuration/policy-resource.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -456,6 +456,9 @@ This feature is implemented using the NGINX Plus directive [auth_jwt_key_request
456456
|``token`` | The token specifies a variable that contains the JSON Web Token. By default the JWT is passed in the ``Authorization`` header as a Bearer Token. JWT may be also passed as a cookie or a part of a query string, for example: ``$cookie_auth_token``. Accepted variables are ``$http_``, ``$arg_``, ``$cookie_``. | ``string`` | No | -- |
457457
|``sniEnabled`` | Enables SNI (Server Name Indication) for the JWT policy. This is useful when the remote server requires SNI to serve the correct certificate. | ``bool`` | No | `false` |
458458
|``sniName`` | The SNI name to use when connecting to the remote server. If not set, the hostname from the ``jwksURI`` will be used. | ``string`` | No | -- |
459+
|``sslVerify`` | Enables verification of the JWKS server SSL certificate. | ``bool`` | No | `false` |
460+
|``sslVerifyDepth`` | Sets the verification depth in the JWKS server certificates chain. | ``int`` | No | `1` |
461+
|``trustedCertSecret`` | The name of the Kubernetes secret that stores the CA certificate for JWKS server verification. It must be in the same namespace as the Policy resource. The secret must be of the type ``nginx.org/ca``, and the certificate must be stored in the secret under the key ``ca.crt``. | ``string`` | No | -- |
459462
{{% /table %}}
460463

461464
{{< call-out "note" >}}

0 commit comments

Comments
 (0)