![deception keyvault validator deception keyvault validator](https://images.g2crowd.com/uploads/product/image/social_landscape/social_landscape_f176b4154a751d10150daa67a57b7dc5/azure-api-apps.jpg)
I've verified when I hit the /identity/.well-known/openid-configuration/jwks endpoint the keys are returned:
![deception keyvault validator deception keyvault validator](https://www.bmc.com/content/dam/bmc/solutions/screenshots/ss-building-job-types-lg.jpg)
** KeyVault keys' Exponent and Modulus are in base64 */ ** KeyVault keys' Kid is a url - strip down to id */ Var keyBundle = await keyVaultClient.GetKeyAsync()
![deception keyvault validator deception keyvault validator](https://jameswestall.files.wordpress.com/2021/06/image.png)
** GetKeysAsync only returns meta data - get actual key */ Var keyVaultKeys = await keyVaultClient.GetKeysAsync(keyVault) įoreach (var keyVaultKey in keyVaultKeys) Var keyVault = string.Format(KeyVaultConstants.KeyVaultUrlFormat, keyVaultSettings.VaultName) Var keyVaultClient = new KeyVaultClient(authentication.KeyVaultAuthenticationCallback) Public async Task> GetValidationKeysAsync() I've injected IValidationKeysStore into the service: OpenIdConnectMiddleware: Error: Unable to read the 'id_token', no suitable ISecurityTokenValidator was found for: '0vEShMHmjG19QeQE0MYESlePrzBnfUxHtQZ2vfbbPi8WuUjr2VGFrxDlzkqCwGOq8j7FZQ83OlfrMk8aZYd5J8ZsVKwruoHPdmGRpnjj2wv/5Ujk7545rdCxwT61NesIa43hFf9qxI7IRr5N6+TQFVjLaGZpmcpT/c5lKhgqPstMpcoZeObQYPv+VSoDnGRXRd2aHn4fhZQz9OMw1ZWfGNa77yw+UD9YL6nWOEWhpdDodbn7+QfUK6k148BmLYzXo/2BPvW/NmSNsjUBEPHdHkAt8aQBxY6EKKtV7/Q6r/dW66yDNWxLrU2DR4SmPnOzsasPOFQ1PYXzbaf7Hg='.