Per a suggestion, I decoded the resulting token using https://jwt.io/ and received the following:
HEADER:
{ "alg": "ES256", "kid": "CXXXXXXXXX", "id": "QXXXXXXXXX.com.mycompany.myproject" }
PAYLOAD:
{ "sub": "com.mycompany.myproject", "jti": "QXXXXXXXXX.com.mycompany.myproject", "iat": 1658508182203, "exp": 1658508212203, "iss": "QXXXXXXXXX" }
VERIFY SIGNATURE:
Invalid signature
(Note, in both this and the original post, I've obfuscated the Apple-issued Team ID and Service ID)
Topic:
App & System Services
SubTopic:
General
Tags: