Skip to content

Commit d403acd

Browse files
committed
docs: remove "enhanced security" framing for JWT auth
JWT Bearer is an alternative to client secrets, not an inherently stronger security measure. Reword to present it as an alternative without claiming enhanced/stronger security.
1 parent 13c1644 commit d403acd

1 file changed

Lines changed: 4 additions & 9 deletions

File tree

docs/guide/authentication.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The CLI supports five authentication methods:
5050

5151
**Client Credentials** uses the API client's secret for non-interactive authentication. This is ideal for CI/CD pipelines and automation.
5252

53-
**JWT Bearer** uses a public/private certificate pair for secure authentication without storing client secrets. This is ideal for production environments and CI/CD where you want stronger security. See [JWT Authentication](#jwt-authentication-certificate-based) for details.
53+
**JWT Bearer** uses a public/private certificate pair for authentication without storing client secrets. See [JWT Authentication](#jwt-authentication-certificate-based) for details.
5454

5555
**Stateful User Auth** uses `b2c auth login` to open a browser for interactive login once, then stores the session on disk. Subsequent commands automatically use the stored token when it is present and valid, without re-opening the browser. Clear the session with `b2c auth logout`. See [Auth Commands](/cli/auth#b2c-auth-login) for details.
5656

@@ -80,10 +80,6 @@ For Account Manager operations that require user-level roles (organization and A
8080
- `client_secret_basic` for client credentials flow
8181
- `private_key_jwt` for JWT Bearer authentication (certificate-based)
8282

83-
::: tip Certificate-Based Authentication
84-
For enhanced security, use JWT Bearer authentication instead of client secrets. This requires uploading a certificate to the API client and using the `--jwt-cert` and `--jwt-key` flags. See [JWT Authentication](#jwt-authentication-certificate-based) for setup instructions.
85-
:::
86-
8783
::: info
8884
For client credentials with secrets, use `client_secret_basic` (the default). `client_secret_post` is not currently supported.
8985
:::
@@ -166,7 +162,7 @@ If you're running the CLI behind a proxy where `localhost:8080` isn't reachable
166162

167163
## JWT Authentication (Certificate-Based)
168164

169-
JWT Bearer authentication (RFC 7523) provides a more secure alternative to client secrets by using public/private certificate pairs. This is ideal for production environments and CI/CD pipelines where you want to avoid storing sensitive secrets.
165+
JWT Bearer authentication (RFC 7523) is an alternative to client secrets that uses public/private certificate pairs. This can be useful in environments where you want to avoid storing client secrets.
170166

171167
### How It Works
172168

@@ -177,9 +173,8 @@ JWT Bearer authentication (RFC 7523) provides a more secure alternative to clien
177173

178174
### Benefits
179175

180-
- **More secure**: Private key never leaves your machine
181-
- **No secrets to leak**: No client secret to store or compromise
182-
- **Better for CI/CD**: Certificates can be rotated without updating secrets across pipelines
176+
- **No client secret required**: Authenticate without storing a client secret
177+
- **Rotation**: Certificates can be rotated without updating secrets across pipelines
183178
- **Industry standard**: Implements OAuth 2.0 JWT Bearer (RFC 7523)
184179

185180
### Setup Instructions

0 commit comments

Comments
 (0)