Skip to content

Files

Latest commit

 

History

History
66 lines (47 loc) · 2.01 KB

enableNonRepudiationChecks.md

File metadata and controls

66 lines (47 loc) · 2.01 KB

Function: enableNonRepudiationChecks()

💗 Help the project

Support from the community to continue maintaining and improving this module is welcome. If you find the module useful, please consider supporting the project by becoming a sponsor.


enableNonRepudiationChecks(config): void

Enables validating the JWS Signature of either a JWT Response.body or TokenEndpointResponse.id_token of a processed Response such as JWT UserInfo or JWT Introspection responses.

Note: Validating signatures of JWTs received via direct communication between the client and a TLS-secured endpoint (which it is here) is not mandatory since the TLS server validation is used to validate the issuer instead of checking the token signature. You only need to use this method for non-repudiation purposes.

Note: URL of the authorization server's JWK Set document must be configured.

Note: Supports only digital signatures using these supported JWS Algorithms.

Parameters

Parameter Type
config Configuration

Returns

void

Examples

Usage with a Configuration obtained through discovery to also disable the its HTTPS-only restriction.

let server!: URL
let clientId!: string
let clientMetadata!: Partial<client.ClientMetadata> | string | undefined
let clientAuth!: client.ClientAuth | undefined

let config = await client.discovery(
  server,
  clientId,
  clientMetadata,
  clientAuth,
  {
    execute: [client.enableNonRepudiationChecks],
  },
)

Usage with a Configuration instance

let config!: client.Configuration

client.enableNonRepudiationChecks(config)