Security.Jwt
Security.Jwt copied to clipboard
Jwt Manager. Set of components to deal with Jwt Stuff. Automate your key rotating, add support for jwks_uri. Store your cryptography keys in a secure place.
Security Keys in database wasn't filtered for revocation.
Is there a way to generate a new key before expiration of old key so that client can replace the old key?
Bumps [Microsoft.AspNetCore.Authentication.JwtBearer](https://github.com/aspnet/AspNetCore) from 3.1.6 to 3.1.18. Release notes Sourced from Microsoft.AspNetCore.Authentication.JwtBearer's releases. .NET Core 3.1.18 Release .NET Core 3.1.17 Release .NET Core 3.1.16 Release .NET Core 3.1.15 Release .NET Core...
Bumps [Microsoft.AspNetCore.Authentication.JwtBearer](https://github.com/aspnet/AspNetCore) from 3.1.6 to 3.1.18. Release notes Sourced from Microsoft.AspNetCore.Authentication.JwtBearer's releases. .NET Core 3.1.18 Release .NET Core 3.1.17 Release .NET Core 3.1.16 Release .NET Core 3.1.15 Release .NET Core...
Bumps [Microsoft.AspNetCore.Authentication.JwtBearer](https://github.com/aspnet/AspNetCore) from 3.1.6 to 3.1.18. Release notes Sourced from Microsoft.AspNetCore.Authentication.JwtBearer's releases. .NET Core 3.1.18 Release .NET Core 3.1.17 Release .NET Core 3.1.16 Release .NET Core 3.1.15 Release .NET Core...
Hi, I'm a happy user of your helpful library, but recently I have encounted a problem. After some updates on my project, the SigningCredentials returned by the library was not...
I use `IJwtService` with the following code to generate access token: var credentials = await jwtService.GetCurrentSigningCredentials(); var tokenDescriptor = _jwtSecurityTokenHandler.CreateJwtSecurityToken(_issuer, _issuer, new ClaimsIdentity(claims), expires: DateTime.UtcNow.AddMinutes(60), signingCredentials: credentials); I get here:...
in FileSystemStore.cs this code always return the first file, so it will generate new file repeatly. ``` private string GetCurrentFile() { var files = Directory.GetFiles(KeysPath.FullName, $"*current*.key"); if (files.Any()) return Path.Combine(KeysPath.FullName,...
Did you guys have support for that? @EduardoPires, @brunobritodev
I have a current key stored in the file format with the old alg ES256. Now the default is RSA. I'm trying to migrate from File store to the Database...