Hey @toolness,
With this line in authentication.py changing verify to false in the decode call for user_info, I think we can't guarantee the integrity of the token.
Our UAA server has an endpoint which returns the JSON Web Token (JWT) key, used by the UAA to sign JWT access tokens, and to be used by authorized clients to verify that a token came from the UAA.
We expose it at https://uaa.fr.cloud.gov/token_keys and you can read more about it here after step 3️⃣.
The function call will need to be changed to something like this.
jwt.decode(
access_token,
key='value_from_token_keys_endpoint',
algorithm='alg_from_token_keys_endpoint'
)
This will also need to be updated in the cg-fake-uaa repo as well.