extract from draft-ietf-jose-json-web-key-14:

   The following is a non-normative example of a JWK with a RSA signing
   key represented both as a bare public key and as an X.509 certificate
   using the "x5c" parameter:

     {"kty":"RSA",
      "use":"sig",
      "kid":"1b94c",
      "n":"vrjOfz9CcjBPD5eunqsIo1vQ",
      "e":"AQAB",
      "x5c":
       ["MIIDQjCCAiqgAwIBAgIvACWpkA6SdS4xSvdXK3IVfOWA=="]
     }

How are applications supposed to deal with this?  Non-normatively I suppose :-)

What's the rationale for this if I may ask?

Anders
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to