JWT
This extension provides JWT authentication for the Grafbase Gateway.
Add the following to your Grafbase Gateway configuration file:
# grafbase.toml
[extensions.jwt]
version = "0.2"
Run the install command before starting the gateway
grafbase extension install
# grafbase.toml
[extension.jwt.config]
# == Required ==
# URL to download the JWKS for signature validation.
url = "https://example.com/.well-known/jwks.json"
# == Optional ==
# Expected `iss` claim. By default it is NOT validated.
# issuer = "example.com"
# Expected `aud` claim. By default it is NOT validated.
# audience = "my-project"
# How long the JWKS will be cached, in seconds.
poll_interval = 60
# Header name from which to retrieve the JWT token.
header_name = "Authorization"
# Header value prefix to remove before parsing the JWT token.
header_value_prefix = "Bearer "
Once installed, the authentication extension will be automatically used by the Grafbase Gateway and reject non-authenticated requests.
If you want anonymous users you should change the default authentication in you grafbase.toml
to:
# grafbase.toml
[authentication]
default = "anonymous"
This extension validates JWT (RFC 7519) tokens and verifies signatures using JWKs (RFC 7517) from jwks.url
. The validation follows these steps:
- One of the specified JWK must match the JWT signature.
- If present, the
exp
claim must be a future timestamp, with a 60-second leeway. - If present, the
nbf
claim must be a past timestamp, with a 60-second leeway. - With a configured
issuer
, theiss
claim must match the specifiedissuer
. - With a configured
audience
, theaud
claim must match the specifiedaudience
. If theaud
claim is an array, at least one of the audienceaudience
must match.
Important: Be sure to check with your authentication provider whether you must check audience
and/or the issuer
, you may accept JWT tokens that weren't intended for you service otherwise.