Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add built-in function(s) to verify JWT signatures #421

Closed
tsandall opened this issue Aug 18, 2017 · 0 comments
Closed

Add built-in function(s) to verify JWT signatures #421

tsandall opened this issue Aug 18, 2017 · 0 comments

Comments

@tsandall
Copy link
Member

The current io.jwt.decode built-in doesn't perform any crypto verification of the signature. As mentioned in #417, it would be nice if OPA could verify JWT signatures.

I could see this working one of a few ways (in order of preference):

  1. Add new crypto built-ins to verify signatures independent of JWTs.
  2. Modify the existing JWT decode built-in to to support verification (e.g., add a key param that if set would enable verification).
  3. Add a new JWT decode built-in that also verifies the signature.
ashutosh-narkar added a commit to ashutosh-narkar/opa that referenced this issue Mar 6, 2018
Fixes open-policy-agent#421

removed blank line

updated test

added command info documentation

wrap the error messages

used buitin URL decode method

moved verify token code in tokens module
tsandall pushed a commit that referenced this issue Mar 6, 2018
Fixes #421

removed blank line

updated test

added command info documentation

wrap the error messages

used buitin URL decode method

moved verify token code in tokens module
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant