Should "aud" claim be required for Access JWT? #75
Replies: 1 comment
-
This is the profile that’s referenced by the readme to be validated with the jwt+AT profile https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt Other proprietary implementations should not be using the profile option and be validated as a generic JWT with options as demanded by the producer |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
If I'm not missing anything, currently JWT access token verification will fail if it doesn't have
aud
claim:jose/lib/jwt/verify.js
Line 110 in 75e331d
This is the case with access tokens issued by AWS Cognito. They have
client_id
but notaud
.I found this SO question https://stackoverflow.com/questions/53148711/why-doesnt-amazon-cognito-return-an-audience-field-in-its-access-tokens. One of the answers raises a point that
aud
doesn't seem to be required by specification.Looking at https://tools.ietf.org/html/rfc7519#section-4.1.3, the verbiage is:
What's your take on this?
Beta Was this translation helpful? Give feedback.
All reactions