Keys and Cryptography
Here you can find information on how to manage the crypto configuration of the Identity Server.
Configuring certificates
Add trusted certificates for SSL/TLS connections, signature verification, and issuer trust.
Configuring keystores
Manage private keystores including PKCS#12 format conversion and working with PKCS#1 private keys.
EdDSA support
Use Edwards Curve Digital Signature Algorithm for JWT signing and validation.
Hardware Security Module (HSM)
Integrate hardware security modules to store and manage cryptographic keys in dedicated secure hardware.
Transport Layer Security (TLS)
Configure TLS and Server Name Indication for secure connections.