Skip to content

Commit ec512c2

Browse files
committed
chore: merge [skip ci]
2 parents 5f36693 + f4c45e4 commit ec512c2

File tree

2 files changed

+32
-7
lines changed

2 files changed

+32
-7
lines changed

CHANGELOG.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,28 @@
1+
# [6.0.0](https://github.com/NetDevPack/Security.Jwt/compare/v5.0.10...v6.0.0) (2022-03-17)
2+
3+
4+
### Bug Fixes
5+
6+
* bug in tests ([c8d8084](https://github.com/NetDevPack/Security.Jwt/commit/c8d8084e9626d2321781a1150b4734154e055360))
7+
* ci ([116029d](https://github.com/NetDevPack/Security.Jwt/commit/116029da0bf1cf53920fe7b7827c62c1b2194e96))
8+
* keypath creaete ([e13b78f](https://github.com/NetDevPack/Security.Jwt/commit/e13b78fc2908c740397712bc721b77ed3262dda6))
9+
* path ([449aa0f](https://github.com/NetDevPack/Security.Jwt/commit/449aa0f09d774f5559ae9b9fda97832cdbf60950))
10+
* publish ([c4a3cc0](https://github.com/NetDevPack/Security.Jwt/commit/c4a3cc05db2b695b72ece0219b387872a7111c05))
11+
* teste path ([b9183ac](https://github.com/NetDevPack/Security.Jwt/commit/b9183accb61affe71f8b4bf9532c91aea8f5b937))
12+
* try ([a25d6e0](https://github.com/NetDevPack/Security.Jwt/commit/a25d6e0479880c60cb968b45887af12c1f5e6626))
13+
* try 2 ([fd69a3e](https://github.com/NetDevPack/Security.Jwt/commit/fd69a3e496b5ea211f0847e1329222ac5295f895))
14+
* try 3 ([1d5b603](https://github.com/NetDevPack/Security.Jwt/commit/1d5b603554004c08fe47fb5f531e29aa07b74cdc))
15+
16+
17+
### Features
18+
19+
* .net 6 ([58aa518](https://github.com/NetDevPack/Security.Jwt/commit/58aa51894c26ddab282c627d8d2d97c8c3cd2aeb))
20+
21+
22+
### BREAKING CHANGES
23+
24+
* Refactoring key generation system
25+
126
# v3.1.0
227

328
- First release. Releases based in .NET Core version

README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Key Managemente for JWT - Generate and auto rotate Cryptographic Keys for Jwt
1+
# JWT Key Management for .NET - Generate and auto rotate Cryptographic Keys for your Jwt
22
<p align="center">
33
<img alt="read before" src="docs/important.png" />
44
</p>
@@ -22,14 +22,14 @@ The goal of this project is to help your application security by Managing your J
2222
* Auto create RSA or ECDsa keys
2323
* Support for JWE
2424
* Publish a endpoint with your public key in JWKS format
25-
* Support for another API's to consume the JWKS endpoint
26-
* Auto rotate key every 90 days
27-
* Remove old private keys after key rotation
28-
* Use recommended settings for RSA & ECDSA
25+
* Support for multiple API's to consume the JWKS endpoint
26+
* Auto rotate key every 90 days (Best current practices for Public Key Rotation)
27+
* Remove old private keys after key rotation (NIST Recommendations)
28+
* Use recommended settings for RSA & ECDSA (RFC 7518 Recommendations)
2929
* Uses random number generator to generate keys for JWE with AES CBC (dotnet does not support RSA-OAEP with Aes128GCM)
30-
* By default Save keys in same room of ASP.NET DataProtection (The same place where ASP.NET save the keys to generate MVC cookies)
30+
* By default Save keys in same room of ASP.NET DataProtection (The same place where ASP.NET save the keys to to cryptograph MVC cookies)
3131

32-
It generates Keys way better with RSA and ECDsa algorithms. Which is most recommended by [RFC 7518](https://datatracker.ietf.org/doc/html/rfc7518).
32+
It generates Keys way better with RSA and ECDsa algorithms. Which is most recommended by [RFC 7518](https://datatracker.ietf.org/doc/html/rfc7518).
3333

3434
## Generating Tokens:
3535

0 commit comments

Comments
 (0)