JWKS Endpoint
Curl request
$ curl 'https://stg-id.singpass.gov.sg/.well-known/keys' -i -X GET \
-H 'Accept: application/json'HTTP request
GET /.well-known/keys HTTP/1.1
Accept: application/json
Host: stg-id.singpass.gov.sgHTTP response
HTTP/1.1 200 OK
Cache-Control: max-age=21600, must-revalidate, no-transform, public
X-XSS-Protection: 0
X-Frame-Options: DENY
Date: Thu, 26 Sep 2024 03:38:09 GMT
Connection: keep-alive
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
X-Content-Type-Options: nosniff
Content-Type: application/json
Content-Length: 697
{
"keys" : [ {
"kty" : "EC",
"use" : "sig",
"crv" : "P-256",
"kid" : "eckey-test-secondary",
"x" : "9bRoLZyZeV49dMVYauCapuZJ7g8ae8e0vWERXr77OT8",
"y" : "o6lIAyvlmjV7qkGLlLkPIoKHc9VQxSXWgZ-xnboPuuU"
}, {
"kty" : "EC",
"use" : "sig",
"crv" : "P-256",
"kid" : "eckey-test",
"x" : "MW_NF3jr-Fjn8RMg7_ewHfc4VBNJJUnn_gGht3Y-Aeo",
"y" : "hqdPsdwc8FHpPl47VInEgK2F3and2P_0AnR2q92o4M0"
}, {
"kty" : "EC",
"use" : "sig",
"crv" : "P-256",
"kid" : "alias/test-sp-auth-api-id-token-signing-key-kms-asymmetric-key-alias",
"x" : "wit9gl-WpjLzgpNmpf4RP8UHLDHzqq1HHhQPmGCALdY",
"y" : "oFVT90ZGZdkw8Ok-G9MvsE1SUhh1N0I78LFrprrIHx8"
} ]
}HTTPie request
Request body
Response body
Caching and key rotation
Last updated
Was this helpful?