extract from draft-ietf-jose-json-web-key-14:
The following is a non-normative example of a JWK with a RSA signing
key represented both as a bare public key and as an X.509 certificate
using the "x5c" parameter:
{"kty":"RSA",
"use":"sig",
"kid":"1b94c",
"n":"vrjOfz9CcjBPD5eunqsIo1vQ",
"e":"AQAB",
"x5c":
["MIIDQjCCAiqgAwIBAgIvACWpkA6SdS4xSvdXK3IVfOWA=="]
}
How are applications supposed to deal with this? Non-normatively I suppose :-)
What's the rationale for this if I may ask?
Anders
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose