Verifier (OneOf)#

Path: /profiles/profile{id, type}/settings/authorization-server/client-store/config-backed/client{id}/secondary-authentication-method/verifier

Describes how the client is authenticated

Parameters#

NameTypeRequiredDefaultDescription
secretsha-256-digest-stringoptionalA password used by the client
asymmetric-keyleafrefoptionalA public key that corresponds to the private key the client will use to sign a token with to authenticate itself
jwksnon-empty-stringoptionalA JWKS providing keys that can be used to verify JWT assertions. The JSON String should be base64-encoded.
symmetric-keynon-empty-stringoptionalA secret key that the client will use to sign or integrity protect a token with to authenticate itself
no-authenticationbooleanoptionalfalseWhen no-authentication is selected, the client is a public client. Can only be used for clients that requests tokens, and only makes sense if they use the token endpoint (i.e. use the code flow).
credential-managerleafrefoptionalThe Credential Manager to use to transform the client secret. For configured clients, this credential manager is also used to retrieve the client secret from the configured data source on the credential manager

Subsections#

NameTypeDescription
jwks-uri SectionA key present in a JWKS referenced by an URI, accessed via an optional HTTP client ID
mutual-tls-by-proxy SectionEnable client authentication through mutual-tls by-proxy.
mutual-tls SectionEnable client authentication through direct mutual-tls

Was this helpful?