Skip to content
This repository has been archived by the owner on Nov 19, 2017. It is now read-only.

Jwt10316: Signature validation failed. Keys tried #257

Open
iamsoorya opened this issue Mar 22, 2016 · 0 comments
Open

Jwt10316: Signature validation failed. Keys tried #257

iamsoorya opened this issue Mar 22, 2016 · 0 comments

Comments

@iamsoorya
Copy link

Dear Dominic,

I have set up the certificate and entered the following config

<system.identityModel>

  <!-- relying party -->
  <audienceUris>
    <add value="http://localhost:82/" />
    <add value="urn:RPMI.Login.Test/" />
  </audienceUris>

  <securityTokenHandlers>
    <add type="System.IdentityModel.Tokens.JwtSecurityTokenHandler, System.IdentityModel.Tokens.Jwt"/>
    <securityTokenHandlerConfiguration>
      <issuerNameRegistry type="System.IdentityModel.Tokens.ValidatingIssuerNameRegistry, System.IdentityModel.Tokens.ValidatingIssuerNameRegistry">
        <authority name="https://localhost/WebSite/Services/IdentityServer">
          <keys>
            <add thumbprint="‎6b57c557b281689fe8b697fab01d2c03fb494cd7"/>
                         </keys>
          <validIssuers>
            <add name="https://localhost/WebSite/Services/IdentityServer"/>
          </validIssuers>
        </authority>
      </issuerNameRegistry>
      <issuerTokenResolver type="System.IdentityModel.Tokens.NamedKeyIssuerTokenResolver, System.IdentityModel.Tokens.Jwt">            
        <securityKey symmetricKey="LuzhmoCg2LmPeXKdwiI0j8N2ZS32J3mYo92I2gY/CDI=" name="https://localhost/WebSite/Services/IdentityServer"/>           
      </issuerTokenResolver>
      <certificateValidation certificateValidationMode="None"/>
    </securityTokenHandlerConfiguration>
  </securityTokenHandlers>
</identityConfiguration>

</system.identityModel>

Why must be wrong? When we are using the certificate, I guess we do not need certificate? Could you please help?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

No branches or pull requests

1 participant