@@ -10,8 +10,9 @@ description: >-
10
10
@include 'x509-sha1-deprecation.mdx'
11
11
12
12
~ > ** Note** : Starting in Vault 1.17, if the JWT in the authentication request
13
- contains an ` aud ` claim, the associated ` bound_audiences ` for the "jwt" role
14
- must match at least one of the ` aud ` claims declared for the JWT. For
13
+ contains an ` aud ` claim (typical case) the associated ` bound_audiences ` for the
14
+ "jwt" role must ** exactly** match at least one of the ` aud ` claims declared for
15
+ the JWT. For
15
16
additional details, refer to the [ JWT auth method (API)] ( /vault/api-docs/auth/jwt )
16
17
documentation and [ 1.17 Upgrade Guide] ( /vault/docs/upgrading/upgrade-to-1.17.x#jwt-auth-login-requires-bound-audiences-on-the-role ) .
17
18
@@ -214,7 +215,7 @@ backend instance per method at different paths.
214
215
After verifying the JWT signatures, Vault checks the corresponding ` aud ` claim.
215
216
216
217
If the JWT in the authentication request contains an ` aud ` claim, the
217
- associated ` bound_audiences ` for the role must match at least one of the ` aud `
218
+ associated ` bound_audiences ` for the role must ** exactly ** match at least one of the ` aud `
218
219
claims declared for the JWT.
219
220
220
221
### Via the CLI
@@ -324,7 +325,7 @@ In some cases there are dedicated parameters, for example `bound_subject`,
324
325
that must match the provided ` sub ` claim. For roles of type "jwt":
325
326
326
327
1 . the ` bound_audiences ` parameter is required when an ` aud ` claim is set.
327
- 1 . the ` bound_audiences ` parameter must match at least one of provided ` aud ` claims.
328
+ 1 . the ` bound_audiences ` parameter must ** exactly ** match at least one of provided ` aud ` claims.
328
329
329
330
You can also configure roles to check an arbitrary set of claims and required
330
331
values with the ` bound_claims ` map. For example, assume ` bound_claims ` is set to:
0 commit comments