Replies: 1 comment 2 replies
-
Independent verificationYou can use jwt.io doesn't support the For verification of the In the case of JWT verifiable credentials, it is common that the issuer is listed as a DID in the The Verification using veramoVeramo doesn't directly expose an explicit verification API yet. This is being discussed in #375. At the time of this writing, verification of credentials is baked into message handling. npm i -g @veramo/cli
veramo config create
veramo message handle -r "<the JWT you want to verify>" or programmatically by calling try {
const msg = await agent.handleMessage({ raw: '<the JWT to be verified>', metaData: [{ type: 'test' }] });
console.log('signature is valid');
} catch (e) {
console.log('signature is not valid')
} Programmatic verification like this requires an
|
Beta Was this translation helpful? Give feedback.
-
I created the following VC:
For this example, I used the issuer is also the credential subject to make it simple.
did:ethr:0xc5ed61933bc206b15e14e05a404ed1231abd28e2
pubkeyhex:
047bb2b3d12a72570ecbaa4c7c3543f0ac75dd581d5c7450acf3dc730dd03e54d6f51aed1345df3344f06d2d13818c207a319ee73f68db0d2e2967d26a055ae045
privkeyhex:
ecc4dc12a04fd90c425932fee1f896d2f4d5ea152631ef46a44257f8ca3267fd84d71a98516dfa6aa0d4528a137c8088ff7684f456d9115abbea2bf01e383dcf90ecf1e52eed1b14c11ceeb460f5f9cd190eda890d1e8723e16bdd3f12c2b36c3ac4d61abbe70936
For validating the signature I use jwt.io. It detects
ES256K
as the algorithm. However, I am not able to verify the signature by pasting the private key into the secret field. How do you verify that the signature is correct for the given example?Beta Was this translation helpful? Give feedback.
All reactions