pub enum VerificationStrategies {
Introspection {
introspection_uri: String,
client_id: String,
client_secret: String,
use_basic_auth: bool,
extra_params: Option<Vec<(&'static str, &'static str)>>,
},
JWKs {
jwks_uri: String,
},
UserInfo {
userinfo_uri: String,
},
}Expand description
Supported OAuth token verification strategies.
Each variant represents a different method for validating access tokens, depending on what the authorization server exposes or what your application requires.
Variants§
Introspection
Verifies tokens by calling the authorization server’s introspection endpoint, as defined in RFC 7662.
This method allows the resource server to validate opaque or JWT tokens by sending them to the introspection URI along with its client credentials.
Fields
JWKs
Verifies JWT access tokens using the authorization server’s JSON Web Key Set (JWKS) endpoint.
This strategy allows fully offline signature validation after retrieving the key set, making it efficient for high-throughput services.
UserInfo
Verifies tokens by querying the OpenID Connect UserInfo endpoint.
This strategy is typically used when token validity is tied to the user’s profile information or when the resource server relies on OIDC user data for validation.