@@ -406,19 +406,15 @@ Table of Contents
406406 cryptographic weaknesses. Applications MUST therefore be designed to
407407 enable cryptographic agility.
408408
409- That said, if a JWT is cryptographically protected end-to-end by a
410- transport layer, such as TLS using cryptographically current
411- algorithms, there may be no need to apply another layer of
412- cryptographic protections to the JWT. In such cases, the use of the
413- "none" algorithm can be perfectly acceptable. The "none" algorithm
414- should only be used when the JWT is cryptographically protected by
415- other means. JWTs using "none" are often used in application
416- contexts in which the content is optionally signed. The URL-safe
417- claims representation and processing in this context can be the same
418- in both the signed and unsigned cases. JWT libraries SHOULD NOT
419- generate JWTs using "none" unless explicitly requested to do so by
420- the caller. Similarly, JWT libraries SHOULD NOT consume JWTs using
421- "none" unless explicitly requested by the caller.
409+ The "none" algorithm should only be used when the JWT is
410+ cryptographically protected by other means. JWTs using "none" are
411+ often used in application contexts in which the content is optionally
412+ signed. The URL-safe claims representation and processing in this
413+ context can be the same in both the signed and unsigned cases. JWT
414+ libraries SHOULD NOT generate JWTs using "none" unless explicitly
415+ requested to do so by the caller. Similarly, JWT libraries SHOULD
416+ NOT consume JWTs using "none" unless explicitly requested by the
417+ caller.
422418
423419 Applications SHOULD follow these algorithm-specific recommendations:
424420
0 commit comments