Hi all - can oathkeeper verify JWTs signed with a ...
# talk-oathkeeper
m
Hi all - can oathkeeper verify JWTs signed with a symmetric algorithm? I couldn’t see it in the config, but I wasn’t sure.
m
Ooh! Thanks. I’ve not seen it mentioned in the docs, though. Is it exposed in there yet?
I only see an option for asymmetric (i.e. JWKS):
i
I've not tried it by myself. But just try it. E.g. if your jwt is signed with HMAC-SHA256, configure
allowed_algorithms
with HS256.
m
Ah - and see what errors it throws on where the key is? I can try that.
i
Oathkeeper fetches the key from the configured jwks endpoint. If it can find the corresponding key it should work. The key identification happen via the
kid
claim in the JWT header. If it is not present, you might run into issues (I don't remember wither oathkeeper iterates through the key set in such case to identify the used key). In our case you would like to configure the jwks url to have the key locally available to oathkeeper (in its file system)