Hi Francois!

I think that the "alg" : "RSA256" is more important in the token header than the "type".

Best regards:

Zoltán

2024. 04. 04. 11:42 keltezéssel, COURTAULT Francois írta:

THALES GROUP LIMITED DISTRIBUTION to email recipients

Hello Zoltan,

I don't know why I have written Victor in my previous post ☹

Sorry about that.

Your point is that typ field is missing in my signed JWT header, right ?

I was believing that this one is not mandatory.

Looking at microprofile-jwt-auth-spec-2.0.pdf, typ is recommended but not required.

Anyway I will try and let you know.

Best Regards.

*From:*Tichov Zoltán <tichov.zol...@falconsoft.hu>
*Sent:* jeudi 4 avril 2024 11:34
*To:* users@tomee.apache.org
*Subject:* Re: JWT issue TomEE 9.1.2 micro-profile flavor

Hi Francois!

Try to generate the token with  "alg" : "RSA256" and "type" : "JWT".

Best regards:

Zoltán

2024. 04. 04. 11:18 keltezéssel, COURTAULT Francois írta:

    THALES GROUP LIMITED DISTRIBUTION to email recipients

    Hello Victor,

    I use this library:

    <dependencies>

         <dependency>

           <groupId>org.bitbucket.b_c</groupId>

           <artifactId>jose4j</artifactId>

           <version>0.9.6</version>

         </dependency>

       </dependencies>

    to create the JWT.

    Best Regards.

    -----Original Message-----

From: Tichov Zoltán<tichov.zol...@falconsoft.hu> <mailto:tichov.zol...@falconsoft.hu>
    Sent: jeudi 4 avril 2024 11:06

    To:users@tomee.apache.org

    Subject: Re: JWT issue TomEE 9.1.2 micro-profile flavor

    Hi Francois!

    How did you generate the token?

    Best regards

    2024. 04. 04. 10:38 keltezéssel, COURTAULT Francois írta:

        THALES GROUP LIMITED DISTRIBUTION to email recipients

        Hello everyone,

        I built  a war with a class  which extends Application and annotated

        with @LoginConfig(authMethod = "MP-JWT") I have created a signed JWT

        which is OK when I validated it (public key provided) using jwt.io web

        site

        I want to test this signed JWT with my war.

        In this one, under META-INF, I have created a

        microprofile-config.properties with the following entries

        mp.jwt.verify.publickey=MIIBojANBgkqhkiG9w0BAQEFAAO...  (the same

        public key that I have used to validate the signed JWT using jwt.io

        web site) mp.jwt.verify.issuer=https://server.example.com

        Then I run a curl with -H "Authorization: Bearer

        eyJraWQiOiJhYmMtMTIzNDU2Nzg5MCIsImFsZyI6IlJTMzg0In0.ey ..." (the same 
signed JWT I used on jwt.io web site) I got this:

            *   at client side: ...HTTP Status 401 - Unauthorized ... Invalid 
or not parsable JWT

            *   at server side:

        04-Apr-2024 10:14:31.255 WARNING [http-nio-8080-exec-5] 
org.apache.tomee.microprofile.jwt.MPJWTFilter$ValidateJSonWebToken.parse JWT processing failed. Additional details: [[17] 
Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: The given key (key is null) is not valid for 
SHA384withRSA): JsonWebSignature{"kid":"abc-1234567890","alg":"RS384"}-> 
eyJraWQiOiJhYmMtMTIzNDU2Nzg5MCIsImFsZyI6IlJTMzg0In0.ey...

        What's wrong ?

        Best Regards.


Reply via email to