Should "aud" claim be required for Access JWT? #75
Replies: 1 comment
-
| This is the profile that’s referenced by the readme to be validated with the jwt+AT profile https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt Other proprietary implementations should not be using the profile option and be validated as a generic JWT with options as demanded by the producer | 
Beta Was this translation helpful? Give feedback.
                  
                    0 replies
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
-
If I'm not missing anything, currently JWT access token verification will fail if it doesn't have
audclaim:jose/lib/jwt/verify.js
Line 110 in 75e331d
This is the case with access tokens issued by AWS Cognito. They have
client_idbut notaud.I found this SO question https://stackoverflow.com/questions/53148711/why-doesnt-amazon-cognito-return-an-audience-field-in-its-access-tokens. One of the answers raises a point that
auddoesn't seem to be required by specification.Looking at https://tools.ietf.org/html/rfc7519#section-4.1.3, the verbiage is:
What's your take on this?
Beta Was this translation helpful? Give feedback.
All reactions