Replies: 2 comments 4 replies
-
Hello @JonNode28
There's little opinion in the function, it does exactly what the standard says it should do, sans the documented things it doesn't validate that you're expected to validate after the function resolves.
I am not sure I want to support an API that does off-spec behaviours, it is also not needed, you can instantiate a // with dpop
new Request(new URL("https://rs.example.com/api/path"), {
method: "GET",
headers: new Headers({
authorization: "dpop <JWT Access Token>",
dpop: "<DPoP JWT Proof>",
}),
});
// without dpop
new Request(new URL("https://rs.example.com/api/path"), {
method: "GET",
headers: new Headers({
authorization: "bearer <JWT Access Token>",
}),
}); |
Beta Was this translation helpful? Give feedback.
-
Hi @panva, first of all thanks for maintaining this and all your other amazing auth related libraries. 💯 As far as I can tell RFC9068 is only a "proposed standard" and not a full internet standard yet. Right now I'm trying to validate the access token for requests made to my resource server. The issue is that the type header of the access token issued by my IDP is just "JWT" and not "at+jwt" as enforced by: RFC9068 So I wanted to ask about your view and intention for the I'd be really interested in your opinion on this one. :) Btw: I think it would also be great to have an example on how to validate an access token using the |
Beta Was this translation helpful? Give feedback.
-
The
validateJwtAccessToken
function assumes the access token will be supplied in theauthentication
header which, while a common standard, is not always the case. A lower level function that accepts the access token (and dpop) and does the validation without knowing where the values came from would accomodate other strategies such as secure cookies. Happy to do the work if acceptedBeta Was this translation helpful? Give feedback.
All reactions