Skip to content

Latest commit

 

History

History
74 lines (48 loc) · 3.66 KB

faqs.md

File metadata and controls

74 lines (48 loc) · 3.66 KB

Frequently Asked Questions

Handling Tokens

The generated JWT token can be decoded, is this correct and secure?

This is the expected behavior. While the integrity of tokens is ensured by the generated/verified hash, the contents of the token are only encoded and not encrypted. This means you can be sure the token has not been modified by an unauthorized party, but you should not store confidential information in it. Anyone with access to the token can read all the claims you put into it. They can however not modify them unless they have the (private or symmetric) key used to generate the token. If you need to put confidential information into it, current industry recommends generating a random id and store the data on your server, using the id to look it up whenever you need.

How can new keys be generated for my application?

The algorithms provided are all based on OpenSSL, mixing other cryptographic tools might not work.

Here are a few links for your convenience:

Can this library encrypt/decrypt claims?

No it does not, see #115 for more details. More importantly you probably don't want to be using JWTs for anything sensitive. Read this for more.

Why are my tokens immediately expired?

If you are generating tokens that seem to immediately expire, you are likely mixing local time where it is not required. The JWT specification requires using UTC which this library does.

Here is a simple example of creating a token that will expire in one hour:

auto token = jwt::create()
                .set_issued_now()
                .set_expires_in(std::chrono::seconds{3600})
                .sign(jwt::algorithm::hs256{"secret"});

Can you add claims to a signed token?

The signature includes both the header and payload, according to the RFCs... changing the payload would cause a discrepancy. That should result in the token being rejected. For more details checkout #194.

Why does jwt::basic_claim have no as_object() method?

This was brought up in #212 and #101 as it's an excellent question.

It simply was not required to handle the required keys in JWTs for signing or verification. All the the mandatory keys are numeric, string or array types which required type definitions and access.

The alternative is to use the to_json() method and use the libraries own APIs to pick the data type you need.

Build Issues

Missing _HMAC and _EVP_sha256 symbols on Mac

There seems to exists a problem with the included openssl library of MacOS. Make sure you link to one provided by brew. See #6 for more details.

Building on windows fails with syntax errors

The header <Windows.h>, which is often included in Windows projects, defines macros for MIN and MAX which conflicts with std::numeric_limits. See #5 for more details or this StackOverflow thread.

To fix this do one of the following things:

  • define NOMINMAX, which suppresses this behavior
  • include this library before you #include <Windows.h>
  • place #undef max and #undef min before you include this library