26.0.0.4 post#4793
Conversation
| [#jwt] | ||
| == Support selecting JWT signature and decryption algorithms from JOSE header | ||
|
|
||
| JSON Web Tokens (JWTs) can be signed by using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token. |
There was a problem hiding this comment.
| JSON Web Tokens (JWTs) can be signed by using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token. | |
| JSON Web Tokens (JWTs) can be signed using various cryptographic signature algorithms. With this release, the JWT Consumer, MicroProfile JWT, OpenID Connect Client, and Social Media Login features support selecting the JWT signature algorithm from the JOSE header. This support allows different signature algorithms to be used based on the token. |
There was a problem hiding this comment.
This support allows different signature algorithms to be used based on the token.
->
This support allows different signature algorithms to be used based on the token header.
There was a problem hiding this comment.
JSON Web Tokens (JWTs) can be signed using various cryptographic signature algorithms.
Hi @tloodu As per Acrolinx, it was marked 'ambiguous'. So they suggested this replacement of 'by using'
|
|
||
| When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured. | ||
|
|
||
| See the following `server.xml` file example: |
There was a problem hiding this comment.
| See the following `server.xml` file example: | |
| See the following `server.xml` file configurations for examples on how to apply these settings to the supported elements: |
|
|
||
| If `allowedSignatureAlgorithms` is not configured, the default list contains all Open Liberty-supported signature algorithms: `RS256, RS384, RS512, HS256, HS384, HS512, ES256, ES384, ES512`. | ||
|
|
||
| When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured. |
There was a problem hiding this comment.
| When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured. | |
| When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed alias is found, the client falls back to using the alias specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured. |
There was a problem hiding this comment.
trustedAlias -> trustedAlias
"or trustAliasName attribute" -> "or the trustAliasName attribute"
mpjwt -> mpJwt
|
|
||
| If `allowedSignatureAlgorithms` is not configured, the default list contains all Open Liberty-supported signature algorithms: `RS256, RS384, RS512, HS256, HS384, HS512, ES256, ES384, ES512`. | ||
|
|
||
| When using `FROM_HEADER` with asymmetric algorithms and a trust store setup, the public keys must be prefixed with their corresponding algorithm (e.g., `RS256_keyalias`) for automatic selection. During validation, the server searches the trust store for an alias that begins with the algorithm specified in the JWT's header. If no algorithm-prefixed key is found, the client falls back to using the key specified by the trustedAlias attribute (for `jwtConsumer`) or trustAliasName attribute (for `openidConnectClient`, `oidcLogin` and `mpjwt`), if configured. |
There was a problem hiding this comment.
trustedAlias -> trustedAlias
"or trustAliasName attribute" -> "or the trustAliasName attribute"
mpjwt -> mpJwt
|
|
||
| For more information, see | ||
| link:https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileService[] | ||
| link:https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileTransfer__title__1[] |
There was a problem hiding this comment.
These two links are broken.
I think the double underscores are confusing ascii doc
Is there a way to protect the URL?
|
|
||
| If FileTransfer access to `${server.output.dir}/resources/security` is required, the original behavior can be restored by setting an empty blocklist. | ||
|
|
||
| For more information, see |
There was a problem hiding this comment.
| For more information, see | |
| For more information, see | |
| * https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileService[] | |
| * https://www.ibm.com/docs/en/was-liberty/nd?topic=liberty-list-provided-mbeans#rwlp_mbeans_list__FileTransfer[] | |
| * https://www.ibm.com/docs/en/was-liberty/nd?topic=manually-file-transfer[] |
There was a problem hiding this comment.
@idlewis please provide an anchor text for every links. I had mentioned it in the issue also
There was a problem hiding this comment.
I'm not sure that it would be helpful to have anchor text in this case. The links are to a part of a docs page which doesn't have a useful title, so it is difficult to know what the link text would be. I can come up with something if necessary, but I'd prefer to leave them as is
There was a problem hiding this comment.
Hi @idlewis , it is always recommended to have title. So if you can, please help me with that. Thank you!
e4d0caf
No description provided.