You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enables the method `attest_jwt_client_auth` for use in the server's `clientAuthMethods` configuration.
650
+
651
+
652
+
653
+
_**default value**_:
654
+
```js
655
+
{
656
+
ack:undefined,
657
+
assertAttestationJwtAndPop: [AsyncFunction: assertAttestationJwtAndPop], // see expanded details below
658
+
challengeSecret:undefined,
659
+
enabled:false,
660
+
getAttestationSignaturePublicKey: [AsyncFunction: getAttestationSignaturePublicKey] // see expanded details below
661
+
}
662
+
```
663
+
664
+
<details><summary>(Click to expand) features.attestClientAuth options details</summary><br>
665
+
666
+
667
+
#### assertAttestationJwtAndPop
668
+
669
+
Helper function used to assert the Attestation JWT and Attestation JWT PoP beyond its specification definition, e.g. According to used extension profiles.
670
+
At the point of this helper's invocation the Attestation JWT and Attestation JWT PoP have had their signatures and validity claims verified.
// pop.key - CryptoKey that verified the Attestation JWT PoP signature
685
+
// @param client - client making the request
686
+
}
687
+
```
688
+
689
+
#### challengeSecret
690
+
691
+
A secret value used for generating server-provided Client Attestation PoP JWT challenges. Must be a 32-byte length Buffer instance.
692
+
693
+
694
+
_**default value**_:
695
+
```js
696
+
undefined
697
+
```
698
+
699
+
#### getAttestationSignaturePublicKey
700
+
701
+
Helper function used to verify the issuer identifier of a Client Attestation JWT and to retrieve a public key with which the Client Attestation JWT signature will be verified.
702
+
At the point of this helper's invocation nothing about the Attestation JWT has been verified, only that its format is a JWT.
703
+
The key may be returned as CryptoKey, KeyObject, or a JWK.
Helper function used to validate the JWT Client Authentication Assertion Claims Set and Header beyond what its specification mandates.
2314
+
Helper function used to validate the JWT Client Authentication (`private_key_jwt` and `client_secret_jwt`) Assertion Claims Set and Header beyond what its specification mandates.
2237
2315
2238
2316
2239
2317
_**default value**_:
@@ -3212,6 +3290,7 @@ _**default value**_:
3212
3290
{
3213
3291
authorization:'/auth',
3214
3292
backchannel_authentication:'/backchannel',
3293
+
challenge:'/challenge',
3215
3294
code_verification:'/device',
3216
3295
device_authorization:'/device/auth',
3217
3296
end_session:'/session/end',
@@ -3337,6 +3416,33 @@ Configure `ttl` for a given token type with a function like so, this must return
3337
3416
Fine-tune the algorithms the authorization server supports by declaring algorithm values for each respective JWA use
3338
3417
3339
3418
3419
+
### enabledJWA.attestSigningAlgValues
3420
+
3421
+
JWS "alg" Algorithm values the authorization server supports to verify signed Client Attestation and Client Attestation PoP JWTs with
3422
+
3423
+
3424
+
3425
+
_**default value**_:
3426
+
```js
3427
+
[
3428
+
'ES256',
3429
+
'Ed25519',
3430
+
'EdDSA'
3431
+
]
3432
+
```
3433
+
<a id="enabled-jwa-attest-signing-alg-values-supported-values-list"></a><details><summary>(Click to expand) Supported values list
3434
+
</summary><br>
3435
+
3436
+
```js
3437
+
[
3438
+
'RS256', 'RS384', 'RS512',
3439
+
'PS256', 'PS384', 'PS512',
3440
+
'ES256', 'ES384', 'ES512',
3441
+
'Ed25519', 'EdDSA',
3442
+
]
3443
+
```
3444
+
</details>
3445
+
3340
3446
### enabledJWA.authorizationEncryptionAlgValues
3341
3447
3342
3448
JWE "alg" Algorithm values the authorization server supports for JWT Authorization response (`JARM`) encryption
@@ -3428,7 +3534,7 @@ _**default value**_:
3428
3534
3429
3535
### enabledJWA.clientAuthSigningAlgValues
3430
3536
3431
-
JWS "alg" Algorithm values the authorization server supports for signed JWT Client Authentication
3537
+
JWS "alg" Algorithm values the authorization server supports for signed JWT Client Authentication (`private_key_jwt` and `client_secret_jwt`)
0 commit comments