Authentication
The default behavior of the gateway depends on whether any authentication is configured or not. When there isn't, the gateway will provide an anonymous token for each request. On the other hand, if there is, whether it's an extension or the deprecated embedded jwt, the gateway will deny access if the user could not be authenticated. This can be controlled with the following:
[authentication]
# If the client could not be authenticated
# Deny access
default = "deny"
# or grant an anonymous token
defualt = "anonymous"
Authentication extensions are available in the Marketplace:
- JWT: Validates a JWT token
The Grafbase Gateway has an embedded JWT authentication implementation, with the same configuration as the JWT extension.
[[authentication.providers]]
[authentication.providers.jwt]
name = "my-authenticator"
[authentication.providers.jwt.jwks]
url = "https://example.com/.well-known/jwks.json"
issuer = "example.com"
audience = "my-project"
poll_interval = 60
[authentication.providers.jwt.header]
name = "Authorization"
value_prefix = "Bearer "
- The
name
field specifies the name of the authenticator. - The
jwks
section specifies the URL of the JWKS endpoint, the issuer, and the audience. The audience can be an array, in which case any audience in the JWT must match any of the audiences in the array. Thepoll_interval
specifies how often the JWKS endpoint should be polled for updates. - The
header
section specifies the header name and value prefix for the JWT token.
The poll_interval
field is a duration.
Read more about JWT authentication.