I would like to understand better how uaa client token verification works with cloud foundry.
After logging in with the cloud foundry cf tool, I have obtained a signed token from using
cf oauth-token
As I understand this token has been signed by cf client and contains the original access token that it has received from the uaa after I have logged in.
Now I can decode this token with any online jwt parser (the token is not sensitive information, since the cf tool is only targeted at my local bosh-lite installation). Yet how do I validate that the token is correct? This is usually a task that the cloud controller would then do, correct?
I have tried using the JJWT java library as follows:
Jwts.parser().setSigningKey("").parseClaimsJws(token).getBody();
Yet it complains about the empty signing key. What is the signing key that the cf client is using? Is is the client secret registered with the UAA?
Any clarification is highly appreciated.