You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@knox.apache.org by "Larry McCay (JIRA)" <ji...@apache.org> on 2013/04/03 20:31:15 UTC
[jira] [Commented] (KNOX-12) Configure aliases for JWT signature
verification
[ https://issues.apache.org/jira/browse/KNOX-12?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13621150#comment-13621150 ]
Larry McCay commented on KNOX-12:
---------------------------------
consider using jwk or jku in order to get the public key that corresponds to the key used for the signature. See: http://tools.ietf.org/html/draft-ietf-jose-json-web-signature-08.
> Configure aliases for JWT signature verification
> ------------------------------------------------
>
> Key: KNOX-12
> URL: https://issues.apache.org/jira/browse/KNOX-12
> Project: Apache Knox
> Issue Type: Bug
> Components: Server
> Affects Versions: 0.2.0
> Reporter: Larry McCay
> Labels: JWT, Security, Signature
> Original Estimate: 24h
> Remaining Estimate: 24h
>
> Currently the signature verification assumes that the cert used is the one that represents the gateway-identity.
> We need to be able to configure the alias of the cert for verification based on the issuer of the JWT.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira