-
Notifications
You must be signed in to change notification settings - Fork 416
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
X.509 Certificates with ECDSA based keys supported? #1291
Comments
@leastprivilege this is a case I don't think we have considered. |
I am not blocked right now. But this is a very reasonable scenario. So I was surprised. |
@brentschmaltz I noticed one of your colleagues saying that the In the FIDO component that I've built, I basically ended up calling |
I see no reason not to support the ECDSA as an X509SecurityKey, as it is supported by using the ECDSASecurityKey. Because you can actually do something like this:
However than you need to set the x5t and kid manually on the JWT, if using that. |
@jaanclaeys @scottbrady91 @leastprivilege I agree with you folks, we should make this work. ECD is preferred by many people. We can't fit this into our SignedHttpRequest effort (our next release), but will get it in the next one. |
any update? |
@leastprivilege we will be setting a date for our next release on Monday 27th. |
@leastprivilege we are working on pushing our 6.x release. We would like to make sure we don't break IdentityServer.
There are some small breaking changes, but we feel they are corner cases.
1131 has been pushed, if you build against a 6.4.2 preview you we can get a sense if we have broken you. Please let us know of any issues. |
If there are breaking changes, then you will probably break us. But that's the way it is. More importantly is that there a not features missing that we rely on. See this separate issue: #1341 |
When is 6.8.1 planned? |
Is this still being worked on? We have common customers that need this feature, @brentschmaltz |
According to this issue, seems this is for the 6.9.1 milestone - oh wait... |
We are working on ECDH-ES and will deliver that in April. |
@ciaozhang to check how far Cesar got in this work. thanks. |
Done by: #1866 |
@brentschmaltz, @ciaozhang, I must be missing something, but the following does not work for me:
|
In effect, this actually is not solved. Problem is that X509SecurityKey only still looks at RSA as a means of finding the private and public key, and extracting x5t out of it. The actual issue is that we want to sign with an X509Certificate2 backed with an ECDSA key. This can be done now with custom code, changing the x5t itself, but it is actually harder to do know with JsonWebToken than it was with previous JWTSecurityToken |
Should this issue be reopened or a new one created? |
There seems another issue reported #2377 that already has a pr. |
I have a x509 cert with an ECDsa based key - here's the metadata:
I can't access the e.g.
PublicKey
property of the X509SecurityKey but worked around that usingCertificate.GetECDsaPublicKey()
- but the JWT handler also throws on singing:Are these keys supported?
The text was updated successfully, but these errors were encountered: