You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When we create an X509Certificate2 to wrap our keys when UseX509Certificate is set to true, we use the configured expiry lifetime of the keys as the certificate's expiry time.
If the key lifetime (rotation interval) is then increased that will let the current keys live for longer. However, the expiry time captured in the certificate will now not be honoured. We will continue to the use the key beyond that time, which is confusing.
The JWK spec does not mention the expiry time. It does however state that
If other members are present, the contents of those members MUST be
semantically consistent with the related fields in the first
certificate.
If all information in the certificate should be consistent with they key data and usage, then we should not continue using a certificate beyond it's lifetime. Updating the certificate when the lifetime changes is non-trivial; the certificates would not be the same and that could cause issues with key lookup.
This is an edge case, but the right thing to do would probably be to take the X5C expiry time into consideration when deciding when to create a new key.
The text was updated successfully, but these errors were encountered:
DP keys are never exposed in a discovery/metadata doc so they can just decide that they will internally ignore the expiry time. For us, the certificate becomes part of the public contract/communication.
As far as I can tell the not before and not after values are mandatory to supply.
When we create an
X509Certificate2
to wrap our keys whenUseX509Certificate
is set totrue
, we use the configured expiry lifetime of the keys as the certificate's expiry time.If the key lifetime (rotation interval) is then increased that will let the current keys live for longer. However, the expiry time captured in the certificate will now not be honoured. We will continue to the use the key beyond that time, which is confusing.
The JWK spec does not mention the expiry time. It does however state that
If all information in the certificate should be consistent with they key data and usage, then we should not continue using a certificate beyond it's lifetime. Updating the certificate when the lifetime changes is non-trivial; the certificates would not be the same and that could cause issues with key lookup.
This is an edge case, but the right thing to do would probably be to take the X5C expiry time into consideration when deciding when to create a new key.
The text was updated successfully, but these errors were encountered: