WORKERS AHEAD!
You are viewing the development documentation for the Apereo CAS server. The functionality presented here is not officially released yet. This is a work in progress and will be continually updated as development moves forward. You are most encouraged to test the changes presented.
JWKS - OpenID Connect Authentication
The JWKS (JSON Web Key Set) endpoint and functionality returns a JWKS containing public keys that enable clients to validate a JSON Web Token (JWT) issued by CAS as an OpenID Connect Provider.
The following settings and properties are available from the CAS configuration catalog:
cas.authn.oidc.jwks.core.jwks-cache-expiration=PT60M
Timeout that indicates how long should the JWKS file be kept in cache. This settings supports the
|
cas.authn.oidc.jwks.core.jwks-key-id=cas
The key identifier to set for the generated key in the keystore. |
cas.authn.oidc.jwks.core.jwks-key-size=2048
The key size for the generated jwks. This is an algorithm-specific metric, such as modulus length, specified in number of bits. If the keystore type isEC , the key size defined here should switch to one of 256 , 384 or 521 . If using EC , then the size should match the number of bits required.
|
cas.authn.oidc.jwks.core.jwks-type=RSA
The type of the JWKS used to handle signing/encryption of authentication tokens. Accepted values are |