'I am using ES256 algorithm and how do I try it in jwt.io?
I'm generating a token using the header, payload and private key I got from apple. But how do I test in jwt.io if this is the valid signature? Because jwt.io wants public and private keys. I do not have a public key and it is not correct to write the private key there?
My example token is like this
eyJhbGciOiJFUzI1NiIsImtpZCI6ImFiYyIsInR5cCI6IkpXVCJ9.eyJpc3MiOiIxMjM0IiwiaWF0IjoxNjUyMzQwOTYzLCJleHAiOjE2NzIzNDQ1NjMsImF1ZCI6ImFwcHN0b3JlY29ubmVjdC12MSIsImJpZCI6ImNvbS5saXZlIn0.pzhtpscducF_J5FG7nX6D_02mqHrsF2epRTv5dtHzahWPiQic5wOdJLtWwbPOWOo4Eq7ZBjaEacOyWhDKKdrWA
When I write this to jwt.io, I get an "Invalid Signature" error because it asks for public and private keys. What should I write in the public and private key parts?
SOLUTION I generated public key using private key and it said Signature Verified
openssl ec -in AuthKey_123ABC456.p8 -pubout -out AuthKey_123ABC456_public.p8
Sources
This article follows the attribution requirements of Stack Overflow and is licensed under CC BY-SA 3.0.
Source: Stack Overflow
Solution | Source |
---|