Skip to content

Commit 504d7e7

Browse files
committed
add more subsections
1 parent 970a117 commit 504d7e7

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

text/0000-cargo-asymmetric-tokens.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,8 @@ A registry can have at most one of `private-key`, `token`, or `credential-proces
8989

9090
## The authentication process
9191

92+
### How Cargo will generate an asymmetric token
93+
9294
When authenticating to a registry, Cargo will generate a PASETO in the [v3.public format](https://github.com/paseto-standard/paseto-spec/blob/master/docs/01-Protocol-Versions/Version3.md). This format uses P-384 and 384-bit ECDSA secret keys, and is compatible with keys stored in contemporary hardware tokens. The generated PASETO will have specific "claims" (key-value pairs in the PASETO's JSON payload).
9395

9496
The claims within the PASETO will include at least:
@@ -105,6 +107,8 @@ The "footer" (which is part of the signature) will be a JSON string in UTF-8 and
105107

106108
PASETO includes the message that was signed, so the server does not have to reconstruct the exact string from the request in order to check the signature. The server does need to check that the signature is valid for the string in the PASETO and that the contents of that string matches the request.
107109

110+
### How the Registry Server will validate an asymmetric token
111+
108112
The registry server will validate the PASETO, and check the footer and claims:
109113

110114
- The PASETO is in v3.public format.

0 commit comments

Comments
 (0)