diff --git a/docs/manual/src/docs/asciidoc/_includes/servlet/oauth2/oauth2-resourceserver.adoc b/docs/manual/src/docs/asciidoc/_includes/servlet/oauth2/oauth2-resourceserver.adoc index 7228b6cb64..4a72c9c54b 100644 --- a/docs/manual/src/docs/asciidoc/_includes/servlet/oauth2/oauth2-resourceserver.adoc +++ b/docs/manual/src/docs/asciidoc/_includes/servlet/oauth2/oauth2-resourceserver.adoc @@ -2536,7 +2536,7 @@ The issuer should be one that the code can verify from a trusted source like a l You may have observed that this strategy, while simple, comes with the trade-off that the JWT is parsed once by the `AuthenticationManagerResolver` and then again by the <> later on in the request. -This extra parsing can be alleviated by configuring the <> directly with a `JWTClaimSetAwareJWSKeySelector` from Nimbus: +This extra parsing can be alleviated by configuring the <> directly with a `JWTClaimsSetAwareJWSKeySelector` from Nimbus: ==== .Java @@ -2544,7 +2544,7 @@ This extra parsing can be alleviated by configuring the < { + implements JWTClaimsSetAwareJWSKeySelector { private final TenantRepository tenants; <1> private final Map> selectors = new ConcurrentHashMap<>(); <2> @@ -2585,7 +2585,7 @@ public class TenantJWSKeySelector [source,kotlin,role="secondary"] ---- @Component -class TenantJWSKeySelector(tenants: TenantRepository) : JWTClaimSetAwareJWSKeySelector { +class TenantJWSKeySelector(tenants: TenantRepository) : JWTClaimsSetAwareJWSKeySelector { private val tenants: TenantRepository <1> private val selectors: MutableMap> = ConcurrentHashMap() <2>