...
The JWT payload contains a set of claims, and it is signed using asymmetric keys. The JWT claim set includes information on the JWT, such as the token’s target, the issuer, the issued token time, and the token’s lifetime. Like the JWT header, the JWT claim set is a JSON object used in calculating the signature.
...
Name | Description | Required for |
---|---|---|
| ("Issued At"): The timestamp when the token was created, specified as seconds since 00:00:00 UTC, January 1, 1970. The server may report an error if this timestamp is too far in the past or future (allowing 10 minutes for skew). | MQTT, HTTP |
| ("Expiration"): The timestamp when the token stops being valid, specified as seconds since 00:00:00 UTC, January 1, 1970. The token’s maximum lifetime is 24 hours + skew.
| MQTT, HTTP |
| ("Audience"): This must be a single string containing the cloud project ID where the device is registered. The authentication will only be allowed with further analysis if the connection request matches this project ID. | MQTT |
| (“System Key”): This must be a single string containing the ClearBlade Registry’s System Key. This can be obtained by clicking the “API Keys” API Keys button (key icon) at the top-right of the Registry Details page of the ClearBlade Registry. | HTTP |
| (“User ID”): This must be a single string containing the deviceId of the device. | HTTP |
| (“User Type”): This must be an integer hard-coded to value 3. | HTTP |
...
The JSON Web Signature (JWS) specification guides the mechanics of generating the JWT signature for the JWT. The input for the signature is the following content’s byte array:
...