Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement custom JWT assertion signing #1001

Merged

Conversation

clementdenis
Copy link
Contributor

  • Can be used to sign with KMS services instead of local private key

Issue(s)

#878

Description

I reworked my previous attempt after JJWT was migrated to 0.12+.

This is one is a bit cleaner and less hacky (still have to pass a 'dummy' key to the JwtBuilder, no workaround for this, unless JJWT changes its API).

Category

  • Bugfix
  • Enhancement
  • New Feature
  • Library Upgrade
  • Configuration Change
  • Versioning Change
  • Unit or Integration Test(s)
  • Documentation

Signoff

  • I have submitted a CLA for this PR
  • Each commit message explains what the commit does
  • I have updated documentation to explain what my PR does
  • My code is covered by tests if required
  • I did not edit any automatically generated files

- Can be used to sign with KMS services instead of local private key
@arvindkrishnakumar-okta arvindkrishnakumar-okta changed the base branch from master to ak_issue_878 May 9, 2024 20:14
@arvindkrishnakumar-okta arvindkrishnakumar-okta merged commit f9b2999 into okta:ak_issue_878 May 9, 2024
arvindkrishnakumar-okta added a commit that referenced this pull request May 15, 2024
* Implement custom JWT assertion signing (#1001)

- Can be used to sign with KMS services instead of local private key

* added typeInfoAnnotation mustache template

* cleanup unused import

---------

Co-authored-by: Clément Denis <clement.denis@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants