Skip to content

fix: makes the x5c header available #1543

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jan 22, 2021
Merged

fix: makes the x5c header available #1543

merged 2 commits into from
Jan 22, 2021

Conversation

RufusJWB
Copy link
Contributor

Making the x5c header available would be the first step to fix #1542

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
@RufusJWB
Copy link
Contributor Author

@brentschmaltz can you have a look into this PR? It is stopping development :-(

@RufusJWB
Copy link
Contributor Author

@brentschmaltz and @GeoK Any hope, you could approve this PR soon?

@RufusJWB
Copy link
Contributor Author

RufusJWB commented Nov 9, 2020

@brentschmaltz @GeoK Any thoughts on this?

/// Gets the certificate used to sign the token
/// </summary>
/// <remarks>If the 'x5c' claim is not found, null is returned.</remarks>
public string X5c => GetStandardClaim(JwtHeaderParameterNames.X5c);

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

x5c header should be string[] (see https://tools.ietf.org/html/rfc7515#section-4.1.6)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll work on that.

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
update
@brentschmaltz brentschmaltz merged commit 5f7ef60 into AzureAD:dev Jan 22, 2021
@RufusJWB
Copy link
Contributor Author

@brentschmaltz Thank you for merging! Do you have an ETA when it will be available in the NUGET package?

@brentschmaltz
Copy link
Member

brentschmaltz commented Jan 25, 2021

@RufusJWB about a week or so.
We will have to make the change to return string[].

@RufusJWB
Copy link
Contributor Author

Currently I'm not able to get the Unit tests running in Visual Studio. So as soon as the header is in NUGET package I'll try to update the return to string[].

@brentschmaltz
Copy link
Member

@RufusJWB we delay sign so we use SN to turn off checking for our assemblies.
We have reg files here: https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/blob/dev/build/strongNameBypass.reg

This was referenced Mar 16, 2021
This was referenced Mar 16, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Validation of JWT based on the x5c header field is not working
3 participants