You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 31, 2024. It is now read-only.
We can only help you if you are on the latest version. Either use the latest 2.x or 3.x
Latest version: 3.1
Issue / Steps to reproduce the problem
At AddSigningCredentials is possible to pass as argument some SecurityKeys (RSA, ECDsa...).
If you create a ECDsaSecurity and convert it as JsonWebKey, then IdentityServer4 dont get crv parameter from JsonWebKey.
At our prod servers we decided to keep all SecurityKeys in Microsoft.IdentityModel.Tokens.JsonWebKey form. So it's easily to manage and store them. But we caught this bug in our Production server when we changed from PS256 to ES256.
We can only help you if you are on the latest version. Either use the latest 2.x or 3.x
Latest version: 3.1
Issue / Steps to reproduce the problem
At AddSigningCredentials is possible to pass as argument some SecurityKeys (RSA, ECDsa...).
If you create a ECDsaSecurity and convert it as JsonWebKey, then IdentityServer4 dont get
crv
parameter from JsonWebKey.At our prod servers we decided to keep all SecurityKeys in
Microsoft.IdentityModel.Tokens.JsonWebKey
form. So it's easily to manage and store them. But we caught this bug in our Production server when we changed from PS256 to ES256.jwks_uri endpoint:
1 - ECDsaSecurityKey
2 - RSA...
3 - JsonWebToken with ECDsaSecurityKey params.
Bug at
DiscoveryResponseGenerator.cs
:The text was updated successfully, but these errors were encountered: