• <small id='ekjAd'></small><noframes id='ekjAd'>

    <legend id='ekjAd'><style id='ekjAd'><dir id='ekjAd'><q id='ekjAd'></q></dir></style></legend>
    <i id='ekjAd'><tr id='ekjAd'><dt id='ekjAd'><q id='ekjAd'><span id='ekjAd'><b id='ekjAd'><form id='ekjAd'><ins id='ekjAd'></ins><ul id='ekjAd'></ul><sub id='ekjAd'></sub></form><legend id='ekjAd'></legend><bdo id='ekjAd'><pre id='ekjAd'><center id='ekjAd'></center></pre></bdo></b><th id='ekjAd'></th></span></q></dt></tr></i><div id='ekjAd'><tfoot id='ekjAd'></tfoot><dl id='ekjAd'><fieldset id='ekjAd'></fieldset></dl></div>

      1. <tfoot id='ekjAd'></tfoot>

          <bdo id='ekjAd'></bdo><ul id='ekjAd'></ul>

        在 C# 中使用公钥验证使用 RS256 算法签名的 JWT

        时间:2023-06-03

        <small id='IK2s1'></small><noframes id='IK2s1'>

              • <bdo id='IK2s1'></bdo><ul id='IK2s1'></ul>
                  <tbody id='IK2s1'></tbody>
                <tfoot id='IK2s1'></tfoot>
                <i id='IK2s1'><tr id='IK2s1'><dt id='IK2s1'><q id='IK2s1'><span id='IK2s1'><b id='IK2s1'><form id='IK2s1'><ins id='IK2s1'></ins><ul id='IK2s1'></ul><sub id='IK2s1'></sub></form><legend id='IK2s1'></legend><bdo id='IK2s1'><pre id='IK2s1'><center id='IK2s1'></center></pre></bdo></b><th id='IK2s1'></th></span></q></dt></tr></i><div id='IK2s1'><tfoot id='IK2s1'></tfoot><dl id='IK2s1'><fieldset id='IK2s1'></fieldset></dl></div>
              • <legend id='IK2s1'><style id='IK2s1'><dir id='IK2s1'><q id='IK2s1'></q></dir></style></legend>
                1. 本文介绍了在 C# 中使用公钥验证使用 RS256 算法签名的 JWT的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

                  问题描述

                  限时送ChatGPT账号..

                  好的,我知道我要问的问题可能很明显,但不幸的是我缺乏这方面的知识,而且这项任务对我来说似乎相当棘手.

                  我有一个由 OpenID Connect Provider 返回的 ID 令牌 (JWT).这里是:

                  <块引用>

                  eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ

                  它的header和payload被解码如下:

                  <代码>{孩子":1e9gdk7","alg":"RS256"}.{"iss": "http://server.example.com",子":248289761001","aud": "s6BhdRkqt3","nonce": "n-0S6_WzA2Mj",exp":1311281970,iat":1311280970,"c_hash": "LDktKdoQak3Pk0cnXxCltA"}

                  从 OIDC 提供商的发现中,我得到了公钥 (JWK):

                  <代码>{"kty":"RSA",孩子":1e9gdk7",N": w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ"e":AQAB"}

                  那么,问题是如何在 C# 中使用我所拥有的 RS256 算法的公钥来验证这个 JWT?如果有一个很好的教程明确描述这个过程,那就太棒了.但是,如何使用 System.IdentityModel.Tokens.Jwt 执行此操作的示例也可以正常工作.

                  更新:我了解,我需要执行以下代码之类的操作,但我不知道从哪里获取用于计算 SHA256 哈希的key".

                  <预> <代码>串tokenStr = eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ";string[] tokenParts = tokenStr.Split('.');RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();rsa.ImportParameters(新的 RSAParameters() {模量= FromBase64Url( w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ"),指数 = FromBase64Url("AQAB")});HMACSHA256 sha = 新 HMACSHA256(key);byte[] hash = sha.ComputeHash(Encoding.UTF8.GetBytes(tokenParts[0] + '.' + tokenParts[1]));byte[] 签名 = rsa.Encrypt(hash, false);字符串 strSignature = Base64UrlEncode(签名);if (String.Compare(strSignature, tokenParts[2], false) == 0)返回真;

                  解决方案

                  感谢jwilleke,我找到了解决方案.要验证 JWT 的 RS256 签名,需要使用 RSAPKCS1SignatureDeformatter 类及其 验证签名方法.

                  这是我的示例数据的确切代码:

                  <预> <代码>串tokenStr = eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ";string[] tokenParts = tokenStr.Split('.');RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();rsa.ImportParameters(新的 RSAParameters() {模量= FromBase64Url( w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ"),指数 = FromBase64Url("AQAB")});SHA256 sha256 = SHA256.Create();byte[] hash = sha256.ComputeHash(Encoding.UTF8.GetBytes(tokenParts[0] + '.' + tokenParts[1]));RSAPKCS1SignatureDeformatter rsaDeformatter = 新 RSAPKCS1SignatureDeformatter(rsa);rsaDeformatter.SetHashAlgorithm("SHA256");if (rsaDeformatter.VerifySignature(hash, FromBase64Url(tokenParts[2])))MessageBox.Show("签名已验证");//...静态字节 [] FromBase64Url(字符串 base64Url){字符串填充 = base64Url.Length % 4 == 0?base64Url : base64Url + "====".Substring(base64Url.Length % 4);string base64 = padded.Replace("_", "/").替换(-",+");返回 Convert.FromBase64String(base64);}

                  Ok, I understand that the question I am asking may be pretty obvious, but unfortunately I lack the knowledge on this subject and this task seems to be quite tricky for me.

                  I have an id token (JWT) returned by OpenID Connect Provider. Here it is:

                  eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ

                  Its header and payload are decoded as this:

                  {
                   "kid":"1e9gdk7",
                   "alg":"RS256"
                  }.
                  {
                   "iss": "http://server.example.com",
                   "sub": "248289761001",
                   "aud": "s6BhdRkqt3",
                   "nonce": "n-0S6_WzA2Mj",
                   "exp": 1311281970,
                   "iat": 1311280970,
                   "c_hash": "LDktKdoQak3Pk0cnXxCltA"
                  }
                  

                  From the OIDC provider's discovery, I've got the public key (JWK):

                  {
                   "kty":"RSA",
                   "kid":"1e9gdk7",
                   "n":"w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ",
                   "e":"AQAB"
                  }
                  

                  So, the question is how exactly in C# can I verify this JWT using the public key for the RS256 algorithm I've got? It would be awesome if there is a good tutorial describing this procedure explicitly. However, an example of how to do this using System.IdentityModel.Tokens.Jwt will also work fine.

                  UPDATE: I understand, that I need to do something like the code below, but I have no idea where to get 'key' for calculating SHA256 hash.

                    string tokenStr = "eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ";
                    string[] tokenParts = tokenStr.Split('.');
                  
                    RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
                    rsa.ImportParameters(
                      new RSAParameters() {
                        Modulus = FromBase64Url("w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ"),
                        Exponent = FromBase64Url("AQAB")
                      });
                  
                    HMACSHA256 sha = new HMACSHA256(key);
                    byte[] hash = sha.ComputeHash(Encoding.UTF8.GetBytes(tokenParts[0] + '.' + tokenParts[1]));
                    byte[] signature = rsa.Encrypt(hash, false);
                    string strSignature = Base64UrlEncode(signature);
                    if (String.Compare(strSignature, tokenParts[2], false) == 0)
                      return true;
                  

                  解决方案

                  Thanks to jwilleke, I have got a solution. To verify the RS256 signature of a JWT, it is needed to use the RSAPKCS1SignatureDeformatter class and its VerifySignature method.

                  Here is the exact code for my sample data:

                    string tokenStr = "eyJraWQiOiIxZTlnZGs3IiwiYWxnIjoiUlMyNTYifQ.ewogImlzcyI6ICJodHRwOi8vc2VydmVyLmV4YW1wbGUuY29tIiwKICJzdWIiOiAiMjQ4Mjg5NzYxMDAxIiwKICJhdWQiOiAiczZCaGRSa3F0MyIsCiAibm9uY2UiOiAibi0wUzZfV3pBMk1qIiwKICJleHAiOiAxMzExMjgxOTcwLAogImlhdCI6IDEzMTEyODA5NzAsCiAiY19oYXNoIjogIkxEa3RLZG9RYWszUGswY25YeENsdEEiCn0.XW6uhdrkBgcGx6zVIrCiROpWURs-4goO1sKA4m9jhJIImiGg5muPUcNegx6sSv43c5DSn37sxCRrDZZm4ZPBKKgtYASMcE20SDgvYJdJS0cyuFw7Ijp_7WnIjcrl6B5cmoM6ylCvsLMwkoQAxVublMwH10oAxjzD6NEFsu9nipkszWhsPePf_rM4eMpkmCbTzume-fzZIi5VjdWGGEmzTg32h3jiex-r5WTHbj-u5HL7u_KP3rmbdYNzlzd1xWRYTUs4E8nOTgzAUwvwXkIQhOh5TPcSMBYy6X3E7-_gr9Ue6n4ND7hTFhtjYs3cjNKIA08qm5cpVYFMFMG6PkhzLQ";
                    string[] tokenParts = tokenStr.Split('.');
                  
                    RSACryptoServiceProvider rsa = new RSACryptoServiceProvider();
                    rsa.ImportParameters(
                      new RSAParameters() {
                        Modulus = FromBase64Url("w7Zdfmece8iaB0kiTY8pCtiBtzbptJmP28nSWwtdjRu0f2GFpajvWE4VhfJAjEsOcwYzay7XGN0b-X84BfC8hmCTOj2b2eHT7NsZegFPKRUQzJ9wW8ipn_aDJWMGDuB1XyqT1E7DYqjUCEOD1b4FLpy_xPn6oV_TYOfQ9fZdbE5HGxJUzekuGcOKqOQ8M7wfYHhHHLxGpQVgL0apWuP2gDDOdTtpuld4D2LK1MZK99s9gaSjRHE8JDb1Z4IGhEcEyzkxswVdPndUWzfvWBBWXWxtSUvQGBRkuy1BHOa4sP6FKjWEeeF7gm7UMs2Nm2QUgNZw6xvEDGaLk4KASdIxRQ"),
                        Exponent = FromBase64Url("AQAB")
                      });
                  
                    SHA256 sha256 = SHA256.Create();
                    byte[] hash = sha256.ComputeHash(Encoding.UTF8.GetBytes(tokenParts[0] + '.' + tokenParts[1]));
                  
                    RSAPKCS1SignatureDeformatter rsaDeformatter = new RSAPKCS1SignatureDeformatter(rsa);
                    rsaDeformatter.SetHashAlgorithm("SHA256");
                    if (rsaDeformatter.VerifySignature(hash, FromBase64Url(tokenParts[2])))
                      MessageBox.Show("Signature is verified");
                  
                  //...
                    static byte[] FromBase64Url(string base64Url)
                    {
                      string padded = base64Url.Length % 4 == 0
                          ? base64Url : base64Url + "====".Substring(base64Url.Length % 4);
                      string base64 = padded.Replace("_", "/")
                                            .Replace("-", "+");
                      return Convert.FromBase64String(base64);
                    }
                  

                  这篇关于在 C# 中使用公钥验证使用 RS256 算法签名的 JWT的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持html5模板网!

                  上一篇:如何解码 JWT 令牌? 下一篇:使用 System.IdentityModel.Tokens.Jwt 解码和验证 JWT 令牌

                  相关文章

                  最新文章

                  <i id='5wwCK'><tr id='5wwCK'><dt id='5wwCK'><q id='5wwCK'><span id='5wwCK'><b id='5wwCK'><form id='5wwCK'><ins id='5wwCK'></ins><ul id='5wwCK'></ul><sub id='5wwCK'></sub></form><legend id='5wwCK'></legend><bdo id='5wwCK'><pre id='5wwCK'><center id='5wwCK'></center></pre></bdo></b><th id='5wwCK'></th></span></q></dt></tr></i><div id='5wwCK'><tfoot id='5wwCK'></tfoot><dl id='5wwCK'><fieldset id='5wwCK'></fieldset></dl></div>
                  1. <legend id='5wwCK'><style id='5wwCK'><dir id='5wwCK'><q id='5wwCK'></q></dir></style></legend>
                      <bdo id='5wwCK'></bdo><ul id='5wwCK'></ul>

                      <small id='5wwCK'></small><noframes id='5wwCK'>

                      <tfoot id='5wwCK'></tfoot>