[
https://issues.apache.org/jira/browse/KNOX-1067?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16205997#comment-16205997
]
ASF subversion and git services commented on KNOX-1067:
-------------------------------------------------------
Commit 9c7aa7e1c7471f71c783681b68beea8e6f3fc2dc in knox's branch
refs/heads/master from [~coheigea]
[ https://git-wip-us.apache.org/repos/asf?p=knox.git;h=9c7aa7e ]
KNOX-1067 - Support different signature algorithms for JWTs
> Support different signature algorithms for JWTs
> -----------------------------------------------
>
> Key: KNOX-1067
> URL: https://issues.apache.org/jira/browse/KNOX-1067
> Project: Apache Knox
> Issue Type: Improvement
> Reporter: Colm O hEigeartaigh
> Assignee: Colm O hEigeartaigh
> Fix For: 0.14.0
>
> Attachments:
> 0001-KNOX-1067-Support-different-signature-algorithms-for.patch
>
>
> Right now, the Knox SSO and Token services can only issue tokens signed with
> RS256. This task is to support a wider range of signature algorithms.
> The following changes are proposed:
> a) The Knox Token Service has a new configuration parameter
> "knox.token.sigalg" which defaults to "RS256".
> b) The Knox SSO Service has a new configuration parameter
> "knoxsso.token.sigalg" which defaults to "RS256".
> c) The DefaultTokenAuthorityService checks the signing algorithm against a
> pre-defined list, which is all of the RSA algorithms (RS* and PS*) from the
> JWA spec.
> d) The JWTFederationFilter + the SSOCookieFederationFilter have a new
> configuration parameter "jwt.expected.sigalg" which defaults to "RS256". The
> received token must be signed with the algorithm that is configured for this
> value.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)