Creating a custom verifier on the developer dashboard
You can use your own login providers with Torus, using one of the custom login schemes (either via JWTs or ECDSA signatures). This way, your users can still use your existing login provider, with CustomAuth. The application should follow the JWT specification and use JWKS for signing whose public keys are exposed by an endpoint.
Head over to developer dashboard to get started with creating a custom verifier.
To create a custom verifier, you'll need
- Verifier ID
- JWK Endpoint
- JWT Validations
#
Verifier IDVerifier ID is the unique identifier to publicly represent a user on a verifier.
e.g: email, sub etc.
#
JWK EndpointAn endpoint containing the JWKS used for signing.
#
JWT ValidationsThese are the claims against which a JWT is validated.
- Token Audience (
aud
):
The audience is your verifier's Applicaiton ID, assigned to your verifier on torus-network.
The aud
value is a case-sensitive string containing a StringOrURI value. Use of this claim is MANDATORY.
- Token Issuer (
iss
):
The issuing authority of the token.
The iss
value is a case-sensitive string containing a StringOrURI value. Use of this claim is OPTIONAL.
You can add upto 3 validations; including any custom claims like email_verified
etc.