Documentation Index
Fetch the complete documentation index at: https://iam-docs.razi.ai/llms.txt
Use this file to discover all available pages before exploring further.
This API Should be used to introspect the JWT for the machine user to ensure the token is issued by the IAM service.
Response Fields
keys: An array of key objects, where each object contains the following fields:
- alg: The algorithm used with the key. In this example,
ES256stands for the ECDSA algorithm using the P-256 curve and SHA-256 hash function. - crv: The curve parameter for elliptic curve keys. Here,
P-256specifies the NIST P-256 curve. - d: The private key for elliptic curve cryptography, which should be kept secret and is used for signing operations.
- kid: The key ID, which is a unique identifier for the key.
- kty: The key type, which indicates the cryptographic algorithm family used by the key. For instance,
ECstands for elliptic curve. - use: The intended use of the key, such as
sigfor signature verification. - x and y: The public key coordinates for elliptic curve keys, representing the X and Y coordinates on the curve.
A sample implementation of the JWKS endpoint can be found here.This method is also available in the IAM SDK 1.0.9.