Authentication
The default behavior of the gateway depends on whether any authentication is configured or not. When there isn't, the gateway will provide an anonymous token for each request. On the other hand, if there is, whether it's an extension or the deprecated embedded jwt, the gateway will deny access if the user could not be authenticated. This can be controlled with the following:
[authentication]
# If the client could not be authenticated
# Deny access
default = "deny"
# or grant an anonymous token
defualt = "anonymous"
Authentication extensions are available in the Marketplace:
- JWT: Validates a JWT token
You can learn how authentication extensions work and build your own with this follow along tutorial: Customize your GraphQL Federation authentication and authorization with Grafbase Extensions.
A complete example can be found on GitHub and the Grafbase SDK is the extension reference.
The Grafbase Gateway has an embedded JWT authentication implementation, with the same configuration as the JWT extension.
[[authentication.providers]]
[authentication.providers.jwt]
name = "my-authenticator"
[authentication.providers.jwt.jwks]
url = "https://example.com/.well-known/jwks.json"
issuer = "example.com"
audience = "my-project"
poll_interval = 60
[authentication.providers.jwt.header]
name = "Authorization"
value_prefix = "Bearer "
- The
name
field specifies the name of the authenticator. - The
jwks
section specifies the URL of the JWKS endpoint, the issuer, and the audience. The audience can be an array, in which case any audience in the JWT must match any of the audiences in the array. Thepoll_interval
specifies how often the JWKS endpoint should be polled for updates. - The
header
section specifies the header name and value prefix for the JWT token.
The poll_interval
field is a duration.
Read more about JWT authentication.