-
Notifications
You must be signed in to change notification settings - Fork 375
Description
I am working on a connection to IdPorten in Norway. We use JWTs here. I am porting some example scripts over to ruby and it seems like the python package python-jose includes verification of at_hash
. https://github.com/mpdavis/python-jose/blob/4b0701b46a8d00988afcc5168c2b3a1fd60d15d8/jose/jwt.py#L426-L458
I haven't tried to look in the spec to see what the standards say. Would you be open to a merge request with this verification? Where is the official spec for this?
Also, I find it quite strange that when you call decode with aud but skip verify_aud it doesn't verify. Why would I pass the aud if I don't want it to verify? Also, the third argument is called verify but seems to work as a kill switch for all verifications.
JWT.decode(
id_token, nil, true, algorithms: ["RS256"],
aud: @client_id)
JWT.decode(
id_token, nil, true, algorithms: ["RS256"],
aud: @client_id, verify_aud: true)
I would like to switch the default value verify_* to true