Authentication and Error Model

Access authentication

Common mints short-lived ES256 access JWTs.

SynckHub verifies JWTs via JWKS and must operate with cached keys when Common is unavailable.

Service authentication

Infra-to-control-plane calls use opaque infra bearer tokens minted by Common.

Do not reuse user JWT assumptions for infra service identity.

Refresh/session model

Common refresh tokens are cookie-based and origin-constrained.

Client behavior must follow Common cookie and allowed-origin rules, especially across multiple origins.

Error envelope

Common and platform contracts use stable error shape:

{ "code": "SOME_CODE", "message": "human-readable message" }

Treat code as the machine contract and message as operator context.