Skip to content
This repository was archived by the owner on Mar 29, 2025. It is now read-only.
Discussion options

You must be logged in to vote

No OIDC Authorization Server will issue ID Tokens represented as PASETO because, well the specification defines it as a JWT.

JWTs, like PASETOs can come in configuration that requires decryption before being decoded. In OpenID Connect's ID Tokens this is done by first signing, then encrypting (either symmetric or public-key) for the recipient. This is an affordance that needs to be supported by the authorization server.

FWIW PASETO public is also "just" signed, and can be decoded to obtain its claims without any keying material.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@iambumblehead
Comment options

Answer selected by iambumblehead
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants