Microsoft.Identity.Client.AuthScheme.PoP.IPoPCryptoProvider
An abstraction over an the asymmetric key operations needed by POP, that encapsulates a pair of
public and private keys and some typical crypto operations.
All symmetric operations are SHA256.
The canonical representation of the JWK.
See https://tools.ietf.org/html/rfc7638#section-3
Algorithm used to sign proof of possession request.
See EC algorithms for ECD.
See RSA algorithms for RSA.
Signs the byte array using the private key