Which validation endpoint you use depends on the type of token that you requested:
OIDC tokens
The following table describes the high-level fields returned at the OIDC token
validation endpoint,
https://confidentialcomputing.googleapis.com/.well-known/openid-configuration
.
Key | Description |
---|---|
claims_supported |
The keys in the attestation token. For more details, see Attestation token claims. |
id_token_signing_alg_values_supported |
The signing algorithms (alg values) supported by the
token. Confidential Space supports the RS256
algorithm. |
issuer |
The HTTPS scheme that Confidential Space uses as its issuer identifier. The value is
|
jwks_uri |
The path to the public keys used to verify the token signature. You can publish these keys in a Cloud Storage bucket. You can find the An example value is
|
response_types_supported |
A list of supported Confidential Space response types. Confidential Space
supports id_token .
|
scopes_supported |
The
OAuth 2.0
scope values that the Confidential VM instance supports.
Confidential Space supports openid only. |
subject_types_supported |
The subject identifier types that Confidential Space
supports. Confidential Space supports
public . |
PKI tokens
The following table describes the high-level fields returned at the PKI token
validation endpoint,
https://confidentialcomputing.googleapis.com/.well-known/attestation-pki-root
.
root_ca_uri |
The path to the root certificate that is used to verify a PKI token type signature. |