Skip to content

26.0.0.4 post#4793

Merged
navaneethsnair1 merged 3 commits into
stagingfrom
26.0.0.4-post
Apr 20, 2026
Merged

26.0.0.4 post#4793
navaneethsnair1 merged 3 commits into
stagingfrom
26.0.0.4-post

Conversation

@navaneethsnair1
Copy link
Copy Markdown
Contributor

No description provided.

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
[#jwt]
== Support selecting JWT signature and decryption algorithms from JOSE header

JSON Web Tokens (JWTs) can be signed by using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
JSON Web Tokens (JWTs) can be signed by using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token.
JSON Web Tokens (JWTs) can be signed using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This support allows different signature algorithms to be used based on the token.

->

This support allows different signature algorithms to be used based on the token header.

Copy link
Copy Markdown
Contributor Author

@navaneethsnair1 navaneethsnair1 Apr 20, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

JSON Web Tokens (JWTs) can be signed using various cryptographic signature algorithms.

Hi @tloodu As per Acrolinx, it was marked 'ambiguous'. So they suggested this replacement of 'by using'

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated

When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured.

See the following `server.xml` file example:
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
See the following `server.xml` file example:
See the following `server.xml` file configurations for examples on how to apply these settings to the supported elements:

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated

If `allowedSignatureAlgorithms` is not configured, the default list contains all Open Liberty-supported signature algorithms: `RS256, RS384, RS512, HS256, HS384, HS512, ES256, ES384, ES512`.

When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured.
When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed alias is found, the client falls back to using the alias specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

trustedAlias -> trustedAlias

"or trustAliasName attribute" -> "or the trustAliasName attribute"

mpjwt -> mpJwt

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated
Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated

If `allowedSignatureAlgorithms` is not configured, the default list contains all Open Liberty-supported signature algorithms: `RS256, RS384, RS512, HS256, HS384, HS512, ES256, ES384, ES512`.

When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

trustedAlias -> trustedAlias

"or trustAliasName attribute" -> "or the trustAliasName attribute"

mpjwt -> mpJwt

Comment thread posts/2026-04-21-26.0.0.4.adoc
nidhin-cp
nidhin-cp previously approved these changes Apr 20, 2026
Copy link
Copy Markdown
Member

@nidhin-cp nidhin-cp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!!

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated

For more information, see
link:https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileService[]
link:https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileTransfer__title__1[]
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These two links are broken.
I think the double underscores are confusing ascii doc
Is there a way to protect the URL?

Comment thread posts/2026-04-21-26.0.0.4.adoc Outdated

If FileTransfer access to `${server.output.dir}/resources/security` is required, the original behavior can be restored by setting an empty blocklist.

For more information, see
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
For more information, see
For more information, see
* https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileService[]
* https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileTransfer[]
* https://www.ibm.com/docs/en/was-liberty/nd?topic=manually-file-transfer[]

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@idlewis please provide an anchor text for every links. I had mentioned it in the issue also

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure that it would be helpful to have anchor text in this case. The links are to a part of a docs page which doesn't have a useful title, so it is difficult to know what the link text would be. I can come up with something if necessary, but I'd prefer to leave them as is

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @idlewis , it is always recommended to have title. So if you can, please help me with that. Thank you!

@navaneethsnair1 navaneethsnair1 merged commit 265b1f4 into staging Apr 20, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants