This repository has been archived by the owner. It is now read-only.
Accept JWT from Service Clients and return authorization token #328
Milestone
Comments
Merged
seanmonstar
added a commit
that referenced
this issue
Sep 28, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 28, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 30, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 30, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 30, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 30, 2015
seanmonstar
added a commit
that referenced
this issue
Sep 30, 2015
seanmonstar
added a commit
that referenced
this issue
Oct 1, 2015
|
@seanmonstar I went ahead and made a "blocked" column in waffle, which this now shows up in. I'm not 100% clear on the intended semantics of "blocked" here, and how it differs from "waiting on review bandwidth". But we can figure that out as we go. |
seanmonstar
added a commit
that referenced
this issue
Oct 13, 2015
seanmonstar
added a commit
that referenced
this issue
Nov 16, 2015
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Following Google's lead, Service Clients will generate JWTs to request data for a specific user, signing it with the private key that was gotten during registration.
Algorithms:
Example JavaScript of making the JWT:
The
jwtcalculated above would be used as an argument when requesting an authorization token.No additional parameters are required (and are ignored (illegal?)), as they are contained within the signed assertion claim set. The authorization_token will expire, just as when a typical client uses a refresh token.
The text was updated successfully, but these errors were encountered: