如何在Nimbus JOSE + JWT中验证令牌签名

Sat*_*dev 2 java oauth jwt

在使用Nimbus JOSE + JWT进行的每个资源请求中,我都有从服务器到客户端的来回令牌

用于创建JWT令牌的代码:

public class TokenProvider {

    String token = "";

    public String getToken(String email) {
        try {
            KeyPairGenerator keyGenerator = KeyPairGenerator.getInstance("RSA");
            keyGenerator.initialize(1024);

            KeyPair kp = keyGenerator.genKeyPair();
            RSAPublicKey publicKey = (RSAPublicKey) kp.getPublic();
            RSAPrivateKey privateKey = (RSAPrivateKey) kp.getPrivate();

            System.out.println("publicKey: " + publicKey);
            System.out.println("privateKey: " + privateKey.toString());

            JWSSigner signer = new RSASSASigner(privateKey);

            JWTClaimsSet claimsSet = new JWTClaimsSet();
            claimsSet.setSubject("RTH");
            claimsSet.setCustomClaim("email", email);
            claimsSet.setCustomClaim("role", "USER");
            claimsSet.setIssuer("https://rth.com");
            claimsSet.setExpirationTime(new Date(new Date().getTime() + 60 * 1000));

            SignedJWT signedJWT = new SignedJWT(new JWSHeader(JWSAlgorithm.RS256), claimsSet);

            signedJWT.sign(signer);
            token = signedJWT.serialize();
            TokenSaverAndValidatorDAO tokenSaver = new TokenSaverAndValidatorDAO();
            tokenSaver.saveTokenToDB(email, token);

            signedJWT = SignedJWT.parse(token);

            JWSVerifier verifier = new RSASSAVerifier(publicKey);
            System.out.println("verifier: " + verifier);
            System.out.println("verify method: " + signedJWT.verify(verifier));
            assertTrue(signedJWT.verify(verifier));
            assertEquals("RTH", signedJWT.getJWTClaimsSet().getSubject());
            assertEquals("https://rth.com", signedJWT.getJWTClaimsSet().getIssuer());
            assertTrue(new Date().before(signedJWT.getJWTClaimsSet().getExpirationTime()));
        } catch (JOSEException | ParseException | NoSuchAlgorithmException ex) {
            Logger.getLogger(TokenProvider.class.getName()).log(Level.SEVERE, null, ex);
        }
        return token;
    }
}
Run Code Online (Sandbox Code Playgroud)

到目前为止,它工作正常,但问题是如何验证从客户端收到的令牌签名?

API来看,只有一种方法看起来像是用于验证,但是它只接受公钥(RSAPublicKey)作为参数而不是令牌。

使用此库从事JWT工作的任何人都请帮忙。谢谢

Mat*_*ttW 5

示例代码可以执行此操作,但是您已在问题中使用了所有代码来执行此操作。

对于共享密钥:

JWSVerifier verifier = new MACVerifier(sharedKey.getBytes());
Run Code Online (Sandbox Code Playgroud)

如果您使用的是RSA密钥对(如您的示例所示),则只需提供公共密钥:

JWSVerifier verifier = new RSASSAVerifier((RSAPublicKey) publicKey);
Run Code Online (Sandbox Code Playgroud)

然后要求它验证签名,并指出如果签名无效,它将引发异常:

boolean verifiedSignature = false;

    try {
      JWSVerifier verifier = new RSASSAVerifier((RSAPublicKey) publicKey);
      verifiedSignature = signedJWT.verify(verifier);
    }
    catch (JOSEException e) {
      System.err.println("Couldn't verify signature: " + e.getMessage());
    }
Run Code Online (Sandbox Code Playgroud)

检验令牌签名的完整方法如下所示:

public static boolean isSignatureValid(String token) {
    // Parse the JWS and verify its RSA signature
    SignedJWT signedJWT;
    try {
        signedJWT = SignedJWT.parse(token);
        JWSVerifier verifier = new RSASSAVerifier((RSAPublicKey) publicKey);
        return signedJWT.verify(verifier);
    } catch (ParseException | JOSEException e) {
        return false;
    }
}
Run Code Online (Sandbox Code Playgroud)