Skip to content

Support JSON Web Key Set URLs #17

@jfallows

Description

@jfallows

OAuth2 JWT Bearer tokens may contain a jku claim, indicating the URL where the jwks can be downloaded, then the corresponding kid within that jwks is used to verify the JWT signature.

This requires a whitelist for jku to prevent abuse, perhaps as web origins.

{
    "jku": "https://evil.com/.well-known/jwks.json"
}

In this example, https://evil.com would not be on the whitelist so this token would not be validated.

Automatically downloaded jku URLs can be cached as an optimization and to limit external interference with runtime performance.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions