Skip to main content

Sender-Constrained Tokens & DPoP

Overview

Keymate binds access tokens to the cryptographic identity of the requesting client using Demonstrating Proof-of-Possession (DPoP) as defined in RFC 9449. This section explains the enforcement model, protection mechanisms, and integration points that make stolen tokens unusable without the corresponding private key.

When to Read This Section

Read this section when you need to understand how Keymate prevents token theft and replay, how DPoP proofs are validated at the gateway, or how DPoP-bound sessions work in the Admin Console.

Who Should Start Here

  • Security engineers implementing or evaluating token protection
  • Platform teams configuring gateway-level DPoP enforcement
  • Architects designing sender-constrained token flows

Key Topics

  • DPoP proof validation and token binding via cnf.jkt
  • Replay protection through distributed JTI tracking
  • Downgrade attack detection for Bearer-scheme misuse
  • Admin Console DPoP-bound session management

Representative Journeys

  1. DPoP Enforcement Model
  2. Replay, Downgrade & Abuse Protection
  3. Admin Console DPoP Sessions
  4. API Gateway DPoP Enforcement
  5. Enforcer Identity Trust Model