Skip to content

As a user, I expect decode the claim set of JWT with validation of the signature and registered claim names #37

@rogeruiz

Description

@rogeruiz

Hey @toolness,

With this line in authentication.py changing verify to false in the decode call for user_info, I think we can't guarantee the integrity of the token.

Our UAA server has an endpoint which returns the JSON Web Token (JWT) key, used by the UAA to sign JWT access tokens, and to be used by authorized clients to verify that a token came from the UAA.

We expose it at https://uaa.fr.cloud.gov/token_keys and you can read more about it here after step 3️⃣.

The function call will need to be changed to something like this.

jwt.decode(
    access_token, 
    key='value_from_token_keys_endpoint', 
    algorithm='alg_from_token_keys_endpoint'
)

This will also need to be updated in the cg-fake-uaa repo as well.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions