Azure AD B2C is intermittently issuing JWT access tokens with mathematically invalid RSA signatures. These tokens fail RSA.VerifyData() validation against the public keys published in the JWKS endpoint, even though:
1. The token's `kid` (Key ID) matches a key in the current JWKS
2. All token claims are valid (correct issuer, audience, not expired)
3. The token format is syntactically correct
4. No corruption occurs during transmission (byte-identical on repeated reads)
The oldest active signing key is 47 days old and may be faulted or corrupt.
Can you check the status of a signing key - I can specify which one.
- Are there any known issues with this specific key?
- Can you force removal/rotation of this key?