Skip to content

Commit 5b59093

Browse files
authored
Merge pull request #2 from claboran/develop
More badges added and typo fixed
2 parents 04b08dc + c0c117e commit 5b59093

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

readme.MD

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,9 @@
22
*This project is not offered, sponsored or endorsed by Salesforce.*
33
> DotNet Authorization of an Salesforce Org with OAuth 2.0 JWT Bearer Flow.
44
5+
![Nuget](https://img.shields.io/nuget/v/ForceDotNetJwtCompanion?style=plastic)
56
[![Build Status](https://dev.azure.com/laboranowitsch/external-projects/_apis/build/status/ForceDotNetJwtCompanion-build-and-publish?branchName=master)](https://dev.azure.com/laboranowitsch/external-projects/_build/latest?definitionId=9&branchName=master)
7+
![GitHub](https://img.shields.io/github/license/claboran/ForceDotNetJwtCompanion)
68

79
It is undesired for server to server communication to maintain passwords and client secrets of a Connected App
810
for several reasons:
@@ -105,7 +107,7 @@ openssl rsa -des3 -in .\server.key -out .\server.key.enc
105107
Usage in code:
106108
```csharp
107109
var apiVersion = "v50.0";
108-
var privateKey = "your_private_loaded_from_somewhere";
110+
var privateKey = "your_private_key_loaded_from_somewhere";
109111
var passPhrase = "your_secret_passphrase_loaded_from_somewhere";
110112
var authClient = new JwtAuthenticationClient(apiVersion);
111113

@@ -146,7 +148,6 @@ Licensed under the MIT license.
146148
* Implement JTI to prevent JWT replay attacks
147149
* Improve comments in code
148150
* CI/CD
149-
* nuget :-) ...
150151

151152
## Dependencies
152153
* Newtonsoft.Json

0 commit comments

Comments
 (0)