-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[(main)] update public key for client:systematic-columna-cura-test #50
Conversation
Any preferred installation date? Or just as soon as possible? |
We would like it as soon as possible please, as we cannot currently test our integration with gateway. |
Allright, I'll put in into pipeline for the next deployment. It will probably be handled by the change board on Tuesday 16/5 |
The deployment will happen on Monday 22/5 at 10-11 o'clock |
Any updates on this? |
Yes, I forgot to update this issues yesterday. The change was performed yesterday 10-11. |
The previous public key in this merge request was actually release on May 22, but for some reason I didn't merge this branch. I can see you have committed a new public key - would you like to have that activated on the test environment? |
We would like it as soon as possible please. |
I'll bring the update to a pre-cab meeting next Tuesday and schedule the deployment for 5. October 8.00-9.00 |
@CuraDevelopment will you be able to verify the public key update tomorrow? It will be installed between 8 and 9 in the morning |
@CuraDevelopment the change is now complete. Is it possible for you to verify? |
@ohetrifork Sorry for late response, but we tested this only on Friday and got following error "Client authentication with signed JWT failed: Signature on JWT token failed validation" when calling https://saml.test001.ehealth.sundhed.dk/auth/realms/ehealth/protocol/openid-connect/token. Could you please double check that everyting fine on your end? (request time stamp 2023-10-06 14:37:28.213) |
@nigtrifork Do you see a reason why Systematic would be getting the above error? Could there be a new certificate on the Kombit STS? |
@CuraDevelopment could you paste your JWT here? Looks like certificates are ok on KL-Gateway |
@CuraDevelopment could you also verify that you have updated the |
JWT seem to be fine: |
Any updates on this?It is becoming to be critical on our end |
@CuraDevelopment The signature in the JWT example can not be verified by the provided public key. This is why it is rejected. You can check this by pasting the JWT and public key here: https://jwt.io/ |
Here's a valid example: valid jwt And the one provided: provided jwt |
My bad. I've created new pull request with updated public key. Could you please accept this on your end? |
We are not allowed to make certificate updates without following a change process, but we have a deployment scheduled for Thursday 19/10, where we can include the new key. |
@CuraDevelopment the new public key is now active. |
No description provided.