Generated by GPT-5-mini| VAPID | |
|---|---|
| Name | VAPID |
| Caption | Voluntary Application Protocol for Internet Devices (conceptual) |
| Introduced | 2015 |
| Developer | Internet community |
| Type | Web authentication protocol |
VAPID
VAPID is an authentication mechanism designed to assert the sender identity of web push messages and related HTTP requests. It enables web applications, push services, and message brokers to present verifiable claims about the originator of a push or subscription action, facilitating interoperability among browser vendors, content delivery networks, and cloud platforms. VAPID complements existing standards for web push and public-key cryptography to reduce dependence on proprietary authentication layers.
VAPID provides an application-layer assertion that associates a push message with an originator by using public-key cryptography and JSON Web Token (JWT) semantics. Implementations typically use elliptic-curve keys to produce a signed claim that includes contact information and an origin URL, enabling services such as Mozilla, Google, Microsoft, Apple Inc., and Cloudflare to make trust decisions. The mechanism ties into standards maintained by organizations like the Internet Engineering Task Force, World Wide Web Consortium, and IETF Working Group discussions, allowing operators such as Fastly, Akamai Technologies, Amazon Web Services, and Google Cloud Platform to adopt consistent policies.
VAPID emerged from efforts to standardize push authentication in the mid-2010s, building on work from projects and communities including Web Push, Push API, Encrypted Content-Encoding, and related drafts circulated among members of the IETF HTTP Working Group, IETF WebPush Working Group, and contributors at Mozilla Corporation. Early implementations were influenced by cryptographic libraries from OpenSSL, BoringSSL, and libsodium, and by JWT conventions used in OAuth 2.0 deployments and JSON Web Token profiles discussed at IETF JOSE Working Group. Major browser vendors like Google Chrome and Mozilla Firefox implemented support that shaped operational models used by providers such as Firebase, SendGrid, and OneSignal. Debates around key formats and header usage involved contributors from companies like Microsoft Corporation, Opera Software, Brave Software, and research institutions including University of Cambridge and Massachusetts Institute of Technology.
VAPID specifies that a sender generates an asymmetric key pair (commonly using the Elliptic Curve Digital Signature Algorithm with the secp256r1 curve), creates a JWT-like claim set containing fields such as an origin and an expiration, and signs the claim using the private key. The public key is conveyed to the push service in a header or parameter so that the recipient—often a push service operated by entities like Mozilla Foundation, Google LLC, Microsoft Azure, or Apple Inc.—can verify the assertion. The specification leverages header fields compatible with HTTP/1.1 and HTTP/2 semantics and interacts with encryption profiles derived from RFC 8291 and RFC 8292-style content-coding. Implementers use libraries that support Elliptic Curve Cryptography, ECDSA, SHA-256, and JWT serialization conventions popularized by projects like Auth0 and Okta.
VAPID is used to authenticate server-originated push messages in web and mobile contexts where operators rely on intermediaries such as Google Cloud Messaging successors, Firebase Cloud Messaging, Apple Push Notification Service, and commercial push platforms like OneSignal and Airship (software company). Enterprises such as Netflix, Spotify, Twitter, Facebook, Instagram, and LinkedIn integrate push flows that can use VAPID assertions when delivering content to browser endpoints maintained by Chrome Web Store extensions or service worker environments. Content delivery scenarios involving Content Delivery Network (CDN) providers like Akamai Technologies and Cloudflare may use VAPID to trace sender provenance across distributed caches and edge compute platforms such as Cloudflare Workers, AWS Lambda@Edge, and Vercel.
Security practices around VAPID include careful private key management, rotation policies influenced by standards used by National Institute of Standards and Technology and internal procedures at organizations like Facebook, Google, Microsoft, and Amazon. Because VAPID embeds contact and origin information, privacy-sensitive deployments must consider data minimization strategies consistent with guidance from regulators such as the European Commission and laws like the General Data Protection Regulation. Threat models address interception and replay mitigation via short-lived tokens and signature verification, drawing on cryptographic guidance from IETF, research from institutions such as Stanford University and ETH Zurich, and operational controls practiced at cloud providers including Google Cloud Platform and Microsoft Azure.
Multiple open-source libraries implement VAPID for server environments and client tooling. Notable projects include implementations in languages and runtimes supported by ecosystems around Node.js, Python Software Foundation projects, Java (programming language) libraries used in Apache Tomcat deployments, and Go (programming language) packages used with Kubernetes clusters. Libraries maintained by communities around Mozilla, OpenJS Foundation, and corporate contributors from Google Open Source and GitHub enable integration with push services like Firebase and platforms such as Heroku, DigitalOcean, and Netlify. Commercial vendors offer SDKs and CLI tools that wrap these libraries for platforms such as AWS, Azure, and Google Cloud Platform.