-
Notifications
You must be signed in to change notification settings - Fork 4k
Q: Support for caching and/or rotating signing keys? #2564
Comments
We have support for this on the
We currently have support for automatically managing and rotating signing keys within IdentityServer, but this feature is only offered as a commercial add-on. If you're interested, send us an email: contact@identityserver.io. |
Hi Brock, Thanks for sharing your initial thoughts on this. The comments in the DiscoveryOptions.cs files state:
This implies that the |
Nothing, really. It seemed sufficient to use the one setting for both. |
Ok, Thanks. |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Relying Parties and other Clients use the public keys made available from the jwks endpoint to validate the signature on tokens issued by Identity Server 4. The OIDC spec recommends using the HTTP
Cache-Control
Header option and themax-age
directive to inform clients how long they can cache the public keys for before returning to the jwks_uri location to retrieve replacement keys from the IdP.http://openid.net/specs/openid-connect-core-1_0.html#RotateEncKeys
There are good reasons to support this functionality:-
Issue / Steps to reproduce the problem
Tracing an access token validation between a relying party and the OP, it appears that Identity Server does not include a
Cache-Control
option in the Header of a HTTP Response to a request to the jwks_uri endpoint.The text was updated successfully, but these errors were encountered: