Can NOT verify did:ether JWT token
See original GitHub issueI try to use Ether-DID library to create new jwt token and after that i can NOT verify it. Here is example code i used.
`const EthrDID = require(‘ethr-did’); const ethrDid = new EthrDID({ provider: web3.currentProvider, address: ‘address’, privateKey: ‘priv-key’ });
var jwt = await ethrDid.signJWT({ claims: { name: ‘Joe Lubin’ } }); //Problem here const { payload, issuer } = ethrDid.verifyJWT(jwt); console.log(payload); // return undefined console.log(issuer); // return undefined`
Issue Analytics
- State:
- Created 5 years ago
- Comments:30 (12 by maintainers)
Top Results From Across the Web
Troubleshooting JWT validation - Google Cloud
If the flag is not used, the JWT token is intercepted and verified by Cloud Run access control IAM server and not by...
Read more >Cannot verify JWT token - Stack Overflow
I am using NestJS and its JWT package based on jsonwebtoken. The generated token is always being invalid, and I am getting a...
Read more >Can't verify JWT token in the backend
Hi there, I have a simple backend for my app and I want to validate whether the request has come from a valid...
Read more >Validate JSON Web Tokens - Auth0
Tokens should be verified to decrease security risks if the token has been, for example, tampered with, misused, or has expired. JWT validation...
Read more >Verifying a JSON web token - Amazon Cognito
characters. If your JWT does not conform to this structure, consider it not valid and do not accept it. Step 2: Validate the...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@mirceanis thanks for that information, much appreciated.
Just to be clear, the delay is needed somewhere between
createSigningDelegate()
andverifyJWT
becausecreateSigningDelegate()
sends a transaction and that block needs to propagate to the node that responds to the calls made byverifyJWT
(resolving the DID document).So, if your flow requires some key delegation for signing but not immediately followed by verification, this delay will not be needed.