Configure an OAuth2 keystore
- Last Updated: February 11, 2026
- 2 minute read
- OpenEdge
- Version 13.0
- Documentation
Validating an access token is an essential step in the OAuth2 resource server authentication and authorization processes. All access tokens must pass the payload requirements, data integrity signature, and (optionally) expiration checks. If any of these checks fails, then the client’s HTTP request is rejected. Validation requires a keystore and encryption key pairing. The keystore type selection requires the appropriate encryption algorithm.
Configure PAS for OpenEdge to use an OAuth2 keystore
| Types | Description |
|---|---|
jwk |
Validates the token using a JWK set of RSA public keys and/or Digital Certificates downloaded from the authorization server who issued the token. |
jwkissuer |
Validates the token using a JWK set of RSA public keys and/or Digital Certificates downloaded from the authorization server who issued the token. Provides more user information than a jwk keystore. |
pkcs12 |
Validates the token using a Java encrypted keystore for AES Secret key and JWK RSA and EC private/certificate pair keys built using Java keytool. |
mac |
Validates the token using a Java encrypted keystore for AES Secret key and JWK RSA and EC private/certificate pair keys built using Java keytool. |
pem |
Validates the toke using a local file system directory path that contains individual .pem files that hold RSA public/private encryption keys. The name of .pem file (minus the .pem extension) is the alias name used to identify which one to use. |
Configure a jwk keystore
A JWK set is a JSON structure that holds one or more individual JWK
JSON objects. Each JWK object contains a single RSA public key and can be identified
by an alias. When a JWT is received and its header contains a kid claim, the kid
value is used as the alias that is used to look up a JWK object. If a JWT's header
does not contain a kid claim, or a JWK cannot be
resolved by alias, the request is rejected.
|
Configure a jwkissuer keystore
The jwkissuer type requires that the
jwkissuerUrl points to a JWK set provider
configuration. The configuration specifies a set of RSA public keys and/or Digital
Certificates downloaded from the authorization server who issue the JWT. This type
is provides more user information than a standard jwk type.
|
A JWT's data integrity signature supports multiple types of algorithms. JWT support in PAS for OpenEdge includes HMAC and RSA (public and private) algorithms, as specified in the JSON Web Signature (JWS) standard.
Configure a mac type keystore
Set the following properties in the oeablSecurity.properties file:
|
|
- value
- A string value, either clear text or encoded text. Encoded text is the output of oe-install-dir/bin/stspwdutil
|
- sample
-
The name of the keystore entry’s alias used when you store the JWT RSA signature’s public-key certificate that you obtained from the authorization server’s operators.
Configure a PEM keystore
All files holding PEM-encoded RSA public keys must be in the form file-name.pem. You must configure the file system directory path (which acts as a keystore) and the alias for finding the PEM file within the file system directory:
|
- The PEM-encoded file may optionally contain the RSA private key.
- A sample PEM-encoded file can be found in a PAS for OpenEdge instance's conf/jwtkeys directory.
|