Cedarling JWT Flow#

Json Web Token Validation#
Note: To enable Json Web Token (JWT) Validation in Cedarling, it is required to populate the trusted_issuers field in the Policy Store.
Enabling JWT Signature Validation#
Cedarling can validate JWT signatures for enhanced security. To enable this feature, set the CEDARLING_JWT_VALIDATION bootstrap property to True. For development and testing purposes, you can set this property to False and submit an unsigned JWT, such as one generated from JWT.io.
Public Key Management#
When token validation is enabled, Cedarling downloads the public keys of the Trusted IDPs specified in the policy store during initialization. Cedarling uses the JWT iss claim to select the appropriate keys for validation.
JWT Revocation#
In enterprise deployments, Cedarling can also check for JWT revocation. This is achieved by following the mechanism described in the OAuth Status Lists draft. Token status enforcement helps mitigate risks associated with account takeover by enabling immediate revocation of all tokens issued to an attacker. Additionally, domains may choose to use Token Status to implement single-use transaction tokens.
Summary of JWT Validation Mechanisms#
Depending on your bootstrap properties, Cedarling may validate JWTs through the following methods:
- Validate signatures from Trusted Issuers
- Check JWT status for revocation
- Discard
id_tokenif theaudclaim does not match theclient_idof the access token - Discard Userinfo tokens that are not associated with a
subclaim from theid_token - Verify
exp(expiration) andnbf(not before) claims of access tokens and id_tokens, if timestamps are provided in the context

Created: 2024-10-08