@@ -629,7 +629,7 @@ Configure the JWKS auth server and CloudSync to use asymmetric key verification.
629629``` yaml
630630 auth-jwks :
631631 environment :
632- ISSUER : http://cloudsync-auth-jwks. <your-app-name>.internal:3002
632+ ISSUER : http://<your-app-name>.internal:3002
633633` ` `
634634
635635The issuer is the **base URL** (CloudSync automatically appends ` /.well-known/jwks.json`).
@@ -640,13 +640,13 @@ In the CloudSync dashboard for this PostgreSQL project:
640640- Go to **Configuration** tab → **Edit connection settings**
641641- Under **JWT allowed issuers**, enter :
642642 ` ` `
643- http://cloudsync-auth-jwks. <your-app-name>.internal:3002
643+ http://<your-app-name>.internal:3002
644644 ` ` `
645645
646646CloudSync will :
647- 1. Receive JWT tokens with `iss : http://cloudsync-auth-jwks. <your-app-name>.internal:3002`
647+ 1. Receive JWT tokens with `iss : http://<your-app-name>.internal:3002`
6486482. Validate the issuer matches the allowed list
649- 3. Fetch the public key from `http://cloudsync-auth-jwks. <your-app-name>.internal:3002/.well-known/jwks.json`
649+ 3. Fetch the public key from `http://<your-app-name>.internal:3002/.well-known/jwks.json`
6506504. Verify the token signature
651651
652652This is how production auth systems (Auth0, Supabase, Firebase) work — no shared secrets needed.
@@ -701,14 +701,14 @@ Enter this in CloudSync dashboard → **Configuration** → **JWT secret**
701701For production setups using asymmetric keys:
702702
703703```
704- http://cloudsync-auth-jwks. <your-app-name>.internal:3002
704+ http://<your-app-name>.internal:3002
705705```
706706
707707Enter this in CloudSync dashboard → ** Configuration** → ** JWT allowed issuers**
708708
709709CloudSync will automatically fetch the public key from:
710710```
711- http://cloudsync-auth-jwks. <your-app-name>.internal:3002/.well-known/jwks.json
711+ http://<your-app-name>.internal:3002/.well-known/jwks.json
712712```
713713
714714---
0 commit comments