-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Key Rollover #26
Conversation
allowing for depricated public/secret keys
Before merging, I will fix a deviation from https://datatracker.ietf.org/doc/html/rfc7517#section-4.7, where certificates in a chain are supposed to appear in an array in |
JSON::JWK already implements RFC 7638
Quick update: For now, I will implement a workaround for manually separating PEM encoded Certificates. |
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
This PR addresses issue #25 and adds support for key rollover.
Certificates have to be specified in
omejdn.yml
.Their public keys are then distributed via
/.well-known/jwks.json
, where each key is assigned akid
equal to its certificate'sx5t
thumbprint.If an operator does not specify a certificate, a self-signed cert is created with two-day validity for testing purposes.