Generates a DPoP proof JWT bound to HTTP method, URL, and optional access token hash.
Proof of possession constrains token use to the holder key and target request.
Generates a DPoP proof JWT bound to HTTP method, URL, and optional access token hash.
Why (Security)
Proof of possession constrains token use to the holder key and target request.
Specifications