This API Should be used to introspect the JWT for the machine user to ensure the token is issued by the IAM service.
Response Fields
keys: An array of key objects, where each object contains the following fields:
- alg: The algorithm used with the key. In this example,
ES256stands for the ECDSA algorithm using the P-256 curve and SHA-256 hash function. - crv: The curve parameter for elliptic curve keys. Here,
P-256specifies the NIST P-256 curve. - d: The private key for elliptic curve cryptography, which should be kept secret and is used for signing operations.
- kid: The key ID, which is a unique identifier for the key.
- kty: The key type, which indicates the cryptographic algorithm family used by the key. For instance,
ECstands for elliptic curve. - use: The intended use of the key, such as
sigfor signature verification. - x and y: The public key coordinates for elliptic curve keys, representing the X and Y coordinates on the curve.
A sample implementation of the JWKS endpoint can be found here.This method is also available in the IAM SDK 1.0.9.