Documentation Index
Fetch the complete documentation index at: https://docs.otpedge.com/llms.txt
Use this file to discover all available pages before exploring further.
The “Usher” Analogy
To understand why verification is necessary, think of OTP Edge like a theater:- The Box Office (
/verify-otp): You give them the OTP code, and they give you a Ticket (the Identity Token). - The Usher (Your Backend): The Box Office is outside. To get to the user’s data (the seat), you must show the Ticket to the Usher.
- The Check: If the Usher doesn’t check the signature on the ticket, anyone could walk in with a fake piece of paper and claim to be a valid user.
Standard Verification Flow
OTP Edge uses the RS256 algorithm. We provide a JWKS (JSON Web Key Set) endpoint that allows your application to fetch and cache our public keys automatically.Verification Examples
Security Checklist
- Backend Only: Verification must ONLY happen on your secure backend server.
- Verify Issuer: Ensure the
issclaim matchesotpedge.com. - Check Expiration: OTP Edge tokens are short-lived (60 seconds) to prevent replay attacks.