File tree Expand file tree Collapse file tree 1 file changed +0
-5
lines changed Expand file tree Collapse file tree 1 file changed +0
-5
lines changed Original file line number Diff line number Diff line change @@ -485,11 +485,6 @@ This set will vary over time as new algorithms are introduced
485485and existing algorithms are deprecated due to discovered cryptographic weaknesses.
486486Applications MUST therefore be designed to enable cryptographic agility.
487487
488- That said, if a JWT is cryptographically protected end-to-end by a
489- transport layer, such as TLS
490- using cryptographically current algorithms, there may be no need to apply another layer of
491- cryptographic protections to the JWT.
492- In such cases, the use of the "none" algorithm can be perfectly acceptable.
493488The "none" algorithm should only be used when the JWT is cryptographically protected by other means.
494489JWTs using "none" are often used in application contexts in which the content is optionally signed.
495490The URL-safe claims representation and processing in this context can be the same in both
You can’t perform that action at this time.
0 commit comments