Re: Manually verifying a JWT
I'm having an issue is similar to the one in the thread above, except that I have no problem manually verifying a JWT signed with the default signing key (HS256), following the instructions in the thread above.
But if I switch to using RS256, with the following steps:
- Go to Edit Application/JWT, and change Access Token signing key to "Auto generate a new key on save..."
- Save, and generate a new JWT token
- Generate a new JWT
- Get the Base64 encoded public key from Settings/Key Master/View/"Access token signing key generated for application foo"
- If I paste 3. and 4. into jwt.io it says the signature is invalid.
If I do the above steps but skip 1. and use the HS256 default signing key the signature is verified without a hitch so I'm not sure what the problem is. I've also verified that the Kid in my JWT header matches the Kid when I view the RSA key in key master.
Would appreciate any help with this because I'd really like to independently verify JWT without hitting the FusionAuth server, and I also don't want to use the HMAC secret in my app backend.
(PS this is on FusionAuth 1.29.3; key was generated with Java client 1.29.1)