Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make JWKSettings signingKey optional #1708

Open
jmaness opened this issue Sep 27, 2023 · 1 comment
Open

Make JWKSettings signingKey optional #1708

jmaness opened this issue Sep 27, 2023 · 1 comment

Comments

@jmaness
Copy link

jmaness commented Sep 27, 2023

For integration with external auth provider (e.g. Okta, Auth0, AWS Cognito) where JWTs only need to be verified and never signed, it would be useful if the signingKey field of JWKSettings was optional (e.g. Maybe Jose.JWK). For now, it seems like a workaround is to populate it with a dummy key.

@b4er
Copy link

b4er commented Mar 26, 2024

The HasServer instance is flawed and that is not possible at the moment (depends on #1560). The router always creates a new (signed) session cookie when auth succeeds (ref).

For now you're stuck writing your own HasServer instance. Using cookie-auth without JWT or JWT without cookie auth is simply impossible as of now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants