Skip to main content
POST
http://localhost:8001
/
keys
/
signing
curl -X POST http://localhost:8001/keys/signing \
  -H "Content-Type: application/json" \
  -d '{
    "customer_id": "550e8400-e29b-41d4-a716-446655440000"
  }'
{
  "key_id": "b2c3d4e5-f6a7-8901-bcde-f12345678901",
  "public_key": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE...\n-----END PUBLIC KEY-----",
  "key_type": "ES256",
  "created_at": "2026-03-01T00:00:00Z"
}
The auth service is deployed on a private network. All endpoints except /health are internal management-plane operations.

Request Body

customer_id
string
required
UUID of the customer to generate the key pair for.

Response

key_id
string
UUID of the newly created signing key.
public_key
string
PEM-encoded public key. Used by the API service to verify JWT signatures in the hot-path validator.
key_type
string
Algorithm identifier. Always ES256.
created_at
datetime
ISO 8601 timestamp of when the key was generated.
curl -X POST http://localhost:8001/keys/signing \
  -H "Content-Type: application/json" \
  -d '{
    "customer_id": "550e8400-e29b-41d4-a716-446655440000"
  }'
{
  "key_id": "b2c3d4e5-f6a7-8901-bcde-f12345678901",
  "public_key": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE...\n-----END PUBLIC KEY-----",
  "key_type": "ES256",
  "created_at": "2026-03-01T00:00:00Z"
}