Encryption
IDaaS supports end-to-end payload encryption with JSON Web Encryption (JWE).Algorithms
The platform uses:ECDH-ES+A256KWfor key agreement and key wrappingA256GCMfor content encryption- EC P-256 keypairs for application and platform keys
How key usage works
- IDaaS encrypts outbound webhook payloads with the application’s public key.
- Client applications encrypt inbound request payloads with the IDaaS public key.
- Applications use their private key material to decrypt webhook payloads.
Key endpoints
Use the API reference for the exact contract, especially:GET /v1/keys/idaasPOST /v1/applications/keys/rotate
Registration-time key material
When an application is registered, the response can include:appPublicKeyJwkappPublicKeyappPrivateKeyWrappedkeyVersion
Recommended flow
- Register the application.
- Persist the wrapped private key in a secure secret store.
- Fetch or cache the IDaaS public key.
- Encrypt sensitive request payloads before sending them.
- Verify webhook signatures, then decrypt webhook bodies.
Operational guidance
- Rotate application keys when compromise is suspected.
- Track
keyVersionfor all consuming systems. - Never expose private keys to frontend or browser clients.
- Keep signature verification and decryption as separate steps.