I’m confused, JsonWebToken absolutely takes and exposes claims. Are you trying to construct a new one from scratch? That’s a bit more convoluted.
I’m confused, JsonWebToken absolutely takes and exposes claims. Are you trying to construct a new one from scratch? That’s a bit more convoluted.
I'm constructing from scratch. I fixed it. Sorry for the rant, but I can see how new devs can feel totally confused.
Oh yea it’s not exactly obvious. But then it’s not just the claims it’s the signing too, and most just want to accept not make. It does suffer from its roots in WS* I’d encourage you to leave feedback on the msal repo github.com/AzureAD/micr...
Btw, I noticed one peculiar issue. It seems the RSA is cached in RsaSecurityKey. If you re-create a new instance, it will fail during validation. Here is a simple example. If I disable the CacheSignatureProviders, then works each time. Not sure why is cached, but finding the root cause was tedious.
Odd. Log an issue with them 😀
I found an issue that was closed. Frankly, I don't understand the rationale here. github.com/AzureAD/azur...