Skip to content

Checking of nonce is essential #344

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed

Checking of nonce is essential #344

wants to merge 1 commit into from

Conversation

martinpaljak
Copy link

OpenID ID token is a JWT, and uses a "nonce" field, intended to be provided by the RP and echoed back in the returned JWT token, thus a piece of a JWT payload that is supposed to be checked, often. In fact, my interpretation of RFC7159 suggests that "jti" is more like a server-assigned UUID of the given token, unknown to the consumer beforehand, thus not a possible input to the verification process (or if anything, a negative input to the verification process, where the knowledge and match of a jti would mean that the token has already been "seen" and "consumed", even if the nonce would be matching)

@ziluvatar
Copy link
Contributor

Good addition. Can you add tests and README information?

@martinpaljak
Copy link
Author

martinpaljak commented May 13, 2017 via email

@ziluvatar
Copy link
Contributor

Closed by #540

@ziluvatar ziluvatar closed this Nov 14, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants