You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Lays the ground for key rotation (see #10). Removes hard coding of JWT
access and refresh tokens and stores the keys in MVars in the in-memory
configuration.
Acts as a store for the keys for the server's different use cases.
A KeyStore is initialised separately and then used when building the
configuration. A default option is provided which loads the keys from
a standard file or generates new keys if the file is not found.
Key rotation is also implemented via a function on the keyring, as well
as dealing with expired keys which are outside the grace period. It relies
on the ordering of the keys, for example, the current signing key will
be the first one found in the list of all keys. If there aren't enough
active keys available to perform singing and encryption, an automatic
key rotation will be performed on startup.
There's currently no way to actually perform a key rotation in a running
server. It would have to be triggered through an admin API, for example.
The OP needs to be able to manage keys as defined in
http://openid.net/specs/openid-connect-core-1_0.html#RotateSigKeys
An RP implementation should be able to use the same code
The text was updated successfully, but these errors were encountered: