Token Verification
Last updated
Was this helpful?
Last updated
Was this helpful?
Was this helpful?
All parties are registered with Sahamati and have entries in the Central Registry and Keycloak Token Server.
This is the entity that is servicing the API request. For e.g. if an FIU calls and AA’s POST /Consent API, the AA is the Resource Server.
This is the entity making the API call. In the earlier example, the FIU is the Client.
The Client calls the token server API with its ClientID and Secret to receive a new token.
The Client will provide the token as aa_api_key in headers of all API calls made to the Resource Server.
On receiving the API call, the Resource Server will perform the following checks:
Decode token provided in aa_api_key (it’s a base-64 encoded JWT token).
Verify token issuer authenticity – i.e. verify if the token was generated by Sahamati Token Server:
Retrieve Sahamati public key from CR.
Verify the token signature using the Sahamati public key.
Verify token validity, check token has not expired:
TokenClaims.exp > TokenClaims.iat AND IsInFuture(TokenClaims.exp)
Verify token ownership: This will verify the owner of the token (as recognized by Sahamati) is also the client calling the API.
Use token.entityID
to look up CR and access the entity’s public key.
Use public key to verify API signature provided in header.x-jws-signature
field.