Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
A feature proposal presented for your consideration, with proposed tests and implementation.
As a JWT consumer, I would like to verify that the claims I receive have been issued within a certain timespan no more than maxAge ago, so that I can limit the exposure window during which the JWT may have been exposed to another party.
Think of it as a verifier-side expiration policy. In an integration scenario, the JWTs I'm consuming do not have an expiration, but they do have an
iat
claim.Usage example:
Implementation note: to align with #109,
maxAge
does not have a unit in the name and instead is implemented using ms. As of the time this PR was opened, #109 had not been merged. I will rebase my branch on that once it is merged.