konnect 2.4.1 published on Thursday, Mar 13, 2025 by kong
konnect.getGatewayPluginJwtSigner
Explore with Pulumi AI
Using getGatewayPluginJwtSigner
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayPluginJwtSigner(args: GetGatewayPluginJwtSignerArgs, opts?: InvokeOptions): Promise<GetGatewayPluginJwtSignerResult>
function getGatewayPluginJwtSignerOutput(args: GetGatewayPluginJwtSignerOutputArgs, opts?: InvokeOptions): Output<GetGatewayPluginJwtSignerResult>
def get_gateway_plugin_jwt_signer(control_plane_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetGatewayPluginJwtSignerResult
def get_gateway_plugin_jwt_signer_output(control_plane_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetGatewayPluginJwtSignerResult]
func LookupGatewayPluginJwtSigner(ctx *Context, args *LookupGatewayPluginJwtSignerArgs, opts ...InvokeOption) (*LookupGatewayPluginJwtSignerResult, error)
func LookupGatewayPluginJwtSignerOutput(ctx *Context, args *LookupGatewayPluginJwtSignerOutputArgs, opts ...InvokeOption) LookupGatewayPluginJwtSignerResultOutput
> Note: This function is named LookupGatewayPluginJwtSigner
in the Go SDK.
public static class GetGatewayPluginJwtSigner
{
public static Task<GetGatewayPluginJwtSignerResult> InvokeAsync(GetGatewayPluginJwtSignerArgs args, InvokeOptions? opts = null)
public static Output<GetGatewayPluginJwtSignerResult> Invoke(GetGatewayPluginJwtSignerInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetGatewayPluginJwtSignerResult> getGatewayPluginJwtSigner(GetGatewayPluginJwtSignerArgs args, InvokeOptions options)
public static Output<GetGatewayPluginJwtSignerResult> getGatewayPluginJwtSigner(GetGatewayPluginJwtSignerArgs args, InvokeOptions options)
fn::invoke:
function: konnect:index/getGatewayPluginJwtSigner:getGatewayPluginJwtSigner
arguments:
# arguments dictionary
The following arguments are supported:
- Control
Plane stringId
- Control
Plane stringId
- control
Plane StringId
- control
Plane stringId
- control_
plane_ strid
- control
Plane StringId
getGatewayPluginJwtSigner Result
The following output properties are available:
- Config
Get
Gateway Plugin Jwt Signer Config - Control
Plane stringId - Created
At double - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Jwt Signer Ordering - Protocols List<string>
- Route
Get
Gateway Plugin Jwt Signer Route - Service
Get
Gateway Plugin Jwt Signer Service - List<string>
- Updated
At double
- Config
Get
Gateway Plugin Jwt Signer Config - Control
Plane stringId - Created
At float64 - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Jwt Signer Ordering - Protocols []string
- Route
Get
Gateway Plugin Jwt Signer Route - Service
Get
Gateway Plugin Jwt Signer Service - []string
- Updated
At float64
- config
Get
Gateway Plugin Jwt Signer Config - control
Plane StringId - created
At Double - enabled Boolean
- id String
- instance
Name String - ordering
Get
Gateway Plugin Jwt Signer Ordering - protocols List<String>
- route
Get
Gateway Plugin Jwt Signer Route - service
Get
Gateway Plugin Jwt Signer Service - List<String>
- updated
At Double
- config
Get
Gateway Plugin Jwt Signer Config - control
Plane stringId - created
At number - enabled boolean
- id string
- instance
Name string - ordering
Get
Gateway Plugin Jwt Signer Ordering - protocols string[]
- route
Get
Gateway Plugin Jwt Signer Route - service
Get
Gateway Plugin Jwt Signer Service - string[]
- updated
At number
- config
Get
Gateway Plugin Jwt Signer Config - control_
plane_ strid - created_
at float - enabled bool
- id str
- instance_
name str - ordering
Get
Gateway Plugin Jwt Signer Ordering - protocols Sequence[str]
- route
Get
Gateway Plugin Jwt Signer Route - service
Get
Gateway Plugin Jwt Signer Service - Sequence[str]
- updated_
at float
- config Property Map
- control
Plane StringId - created
At Number - enabled Boolean
- id String
- instance
Name String - ordering Property Map
- protocols List<String>
- route Property Map
- service Property Map
- List<String>
- updated
At Number
Supporting Types
GetGatewayPluginJwtSignerConfig
- Access
Token List<string>Consumer Bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - Access
Token List<string>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - Access
Token stringIntrospection Body Args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - Access
Token List<string>Introspection Consumer Bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- Access
Token List<string>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - Access
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - Access
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - Access
Token List<string>Introspection Jwt Claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - Access
Token doubleIntrospection Leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - Access
Token List<string>Introspection Scopes Claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - Access
Token List<string>Introspection Scopes Requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - Access
Token doubleIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - Access
Token stringIssuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - Access
Token stringJwks Uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- Access
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - Access
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- Access
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- Access
Token doubleJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - Access
Token stringKeyset - The name of the keyset containing signing keys.
- Access
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - Access
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- Access
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- Access
Token doubleKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - Access
Token doubleLeeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - Access
Token boolOptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - Access
Token stringRequest Header - This parameter tells the name of the header where to look for the access token.
- Access
Token List<string>Scopes Claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - Access
Token List<string>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - Access
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - Access
Token stringUpstream Header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - Access
Token doubleUpstream Leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - Add
Access Dictionary<string, string>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Add
Channel Dictionary<string, string>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Add
Claims Dictionary<string, string> - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Cache
Access boolToken Introspection - Whether to cache access token introspection results.
- Cache
Channel boolToken Introspection - Whether to cache channel token introspection results.
- Channel
Token List<string>Consumer Bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - Channel
Token List<string>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - string
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - Channel
Token stringIntrospection Body Args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - Channel
Token List<string>Introspection Consumer Bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - Channel
Token List<string>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - Channel
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - Channel
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - Channel
Token List<string>Introspection Jwt Claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - Channel
Token doubleIntrospection Leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - Channel
Token List<string>Introspection Scopes Claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - Channel
Token List<string>Introspection Scopes Requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - Channel
Token doubleIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - Channel
Token stringIssuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - Channel
Token stringJwks Uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - Channel
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - Channel
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- Channel
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- Channel
Token doubleJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - Channel
Token stringKeyset - The name of the keyset containing signing keys.
- Channel
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - Channel
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- Channel
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- Channel
Token doubleKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - Channel
Token doubleLeeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - Channel
Token boolOptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - Channel
Token stringRequest Header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - Channel
Token List<string>Scopes Claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - Channel
Token List<string>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - Channel
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - Channel
Token stringUpstream Header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - Channel
Token doubleUpstream Leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - Enable
Access boolToken Introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - Enable
Channel boolToken Introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - Enable
Hs boolSignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - Enable
Instrumentation bool - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - Original
Access stringToken Upstream Header - The HTTP header name used to store the original access token.
- Original
Channel stringToken Upstream Header - The HTTP header name used to store the original channel token.
- Realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - Remove
Access List<string>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- Remove
Channel List<string>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- Set
Access Dictionary<string, string>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Set
Channel Dictionary<string, string>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Set
Claims Dictionary<string, string> - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Trust
Access boolToken Introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - Trust
Channel boolToken Introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- Verify
Access boolToken Expiry - Quickly turn access token expiry verification off and on as needed.
- Verify
Access boolToken Introspection Expiry - Quickly turn access token introspection expiry verification off and on as needed.
- Verify
Access boolToken Introspection Scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - Verify
Access boolToken Scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - Verify
Access boolToken Signature - Quickly turn access token signature verification off and on as needed.
- Verify
Channel boolToken Expiry - Verify
Channel boolToken Introspection Expiry - Quickly turn on/off the channel token introspection expiry verification.
- Verify
Channel boolToken Introspection Scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - Verify
Channel boolToken Scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - Verify
Channel boolToken Signature - Quickly turn on/off the channel token signature verification.
- Access
Token []stringConsumer Bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - Access
Token []stringConsumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - Access
Token stringIntrospection Body Args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - Access
Token []stringIntrospection Consumer Bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- Access
Token []stringIntrospection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - Access
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - Access
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - Access
Token []stringIntrospection Jwt Claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - Access
Token float64Introspection Leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - Access
Token []stringIntrospection Scopes Claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - Access
Token []stringIntrospection Scopes Requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - Access
Token float64Introspection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - Access
Token stringIssuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - Access
Token stringJwks Uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- Access
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - Access
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- Access
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- Access
Token float64Jwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - Access
Token stringKeyset - The name of the keyset containing signing keys.
- Access
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - Access
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- Access
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- Access
Token float64Keyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - Access
Token float64Leeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - Access
Token boolOptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - Access
Token stringRequest Header - This parameter tells the name of the header where to look for the access token.
- Access
Token []stringScopes Claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - Access
Token []stringScopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - Access
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - Access
Token stringUpstream Header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - Access
Token float64Upstream Leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - Add
Access map[string]stringToken Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Add
Channel map[string]stringToken Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Add
Claims map[string]string - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Cache
Access boolToken Introspection - Whether to cache access token introspection results.
- Cache
Channel boolToken Introspection - Whether to cache channel token introspection results.
- Channel
Token []stringConsumer Bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - Channel
Token []stringConsumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - string
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - Channel
Token stringIntrospection Body Args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - Channel
Token []stringIntrospection Consumer Bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - Channel
Token []stringIntrospection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - Channel
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - Channel
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - Channel
Token []stringIntrospection Jwt Claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - Channel
Token float64Introspection Leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - Channel
Token []stringIntrospection Scopes Claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - Channel
Token []stringIntrospection Scopes Requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - Channel
Token float64Introspection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - Channel
Token stringIssuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - Channel
Token stringJwks Uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - Channel
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - Channel
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- Channel
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- Channel
Token float64Jwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - Channel
Token stringKeyset - The name of the keyset containing signing keys.
- Channel
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - Channel
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- Channel
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- Channel
Token float64Keyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - Channel
Token float64Leeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - Channel
Token boolOptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - Channel
Token stringRequest Header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - Channel
Token []stringScopes Claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - Channel
Token []stringScopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - Channel
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - Channel
Token stringUpstream Header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - Channel
Token float64Upstream Leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - Enable
Access boolToken Introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - Enable
Channel boolToken Introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - Enable
Hs boolSignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - Enable
Instrumentation bool - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - Original
Access stringToken Upstream Header - The HTTP header name used to store the original access token.
- Original
Channel stringToken Upstream Header - The HTTP header name used to store the original channel token.
- Realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - Remove
Access []stringToken Claims - remove claims. It should be an array, and each element is a claim key string.
- Remove
Channel []stringToken Claims - remove claims. It should be an array, and each element is a claim key string.
- Set
Access map[string]stringToken Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Set
Channel map[string]stringToken Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Set
Claims map[string]string - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- Trust
Access boolToken Introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - Trust
Channel boolToken Introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- Verify
Access boolToken Expiry - Quickly turn access token expiry verification off and on as needed.
- Verify
Access boolToken Introspection Expiry - Quickly turn access token introspection expiry verification off and on as needed.
- Verify
Access boolToken Introspection Scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - Verify
Access boolToken Scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - Verify
Access boolToken Signature - Quickly turn access token signature verification off and on as needed.
- Verify
Channel boolToken Expiry - Verify
Channel boolToken Introspection Expiry - Quickly turn on/off the channel token introspection expiry verification.
- Verify
Channel boolToken Introspection Scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - Verify
Channel boolToken Scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - Verify
Channel boolToken Signature - Quickly turn on/off the channel token signature verification.
- access
Token List<String>Consumer Bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - access
Token List<String>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - String
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - access
Token StringIntrospection Body Args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - access
Token List<String>Introspection Consumer Bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- access
Token List<String>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - access
Token StringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - access
Token StringIntrospection Hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - access
Token List<String>Introspection Jwt Claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - access
Token DoubleIntrospection Leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - access
Token List<String>Introspection Scopes Claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - access
Token List<String>Introspection Scopes Requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - access
Token DoubleIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - access
Token StringIssuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - access
Token StringJwks Uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- access
Token StringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - access
Token StringJwks Uri Client Password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- access
Token StringJwks Uri Client Username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- access
Token DoubleJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - access
Token StringKeyset - The name of the keyset containing signing keys.
- access
Token StringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - access
Token StringKeyset Client Password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- access
Token StringKeyset Client Username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- access
Token DoubleKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - access
Token DoubleLeeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - access
Token BooleanOptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - access
Token StringRequest Header - This parameter tells the name of the header where to look for the access token.
- access
Token List<String>Scopes Claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - access
Token List<String>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - access
Token StringSigning Algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - access
Token StringUpstream Header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - access
Token DoubleUpstream Leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - add
Access Map<String,String>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Channel Map<String,String>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Claims Map<String,String> - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cache
Access BooleanToken Introspection - Whether to cache access token introspection results.
- cache
Channel BooleanToken Introspection - Whether to cache channel token introspection results.
- channel
Token List<String>Consumer Bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - channel
Token List<String>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - String
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - channel
Token StringIntrospection Body Args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - channel
Token List<String>Introspection Consumer Bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - channel
Token List<String>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - channel
Token StringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - channel
Token StringIntrospection Hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - channel
Token List<String>Introspection Jwt Claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - channel
Token DoubleIntrospection Leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - channel
Token List<String>Introspection Scopes Claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - channel
Token List<String>Introspection Scopes Requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - channel
Token DoubleIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - channel
Token StringIssuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - channel
Token StringJwks Uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - channel
Token StringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - channel
Token StringJwks Uri Client Password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channel
Token StringJwks Uri Client Username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channel
Token DoubleJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - channel
Token StringKeyset - The name of the keyset containing signing keys.
- channel
Token StringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - channel
Token StringKeyset Client Password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channel
Token StringKeyset Client Username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channel
Token DoubleKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - channel
Token DoubleLeeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - channel
Token BooleanOptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - channel
Token StringRequest Header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - channel
Token List<String>Scopes Claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - channel
Token List<String>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - channel
Token StringSigning Algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - channel
Token StringUpstream Header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - channel
Token DoubleUpstream Leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - enable
Access BooleanToken Introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - enable
Channel BooleanToken Introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - enable
Hs BooleanSignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - enable
Instrumentation Boolean - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - original
Access StringToken Upstream Header - The HTTP header name used to store the original access token.
- original
Channel StringToken Upstream Header - The HTTP header name used to store the original channel token.
- realm String
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - remove
Access List<String>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- remove
Channel List<String>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- set
Access Map<String,String>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Channel Map<String,String>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Claims Map<String,String> - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trust
Access BooleanToken Introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - trust
Channel BooleanToken Introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verify
Access BooleanToken Expiry - Quickly turn access token expiry verification off and on as needed.
- verify
Access BooleanToken Introspection Expiry - Quickly turn access token introspection expiry verification off and on as needed.
- verify
Access BooleanToken Introspection Scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - verify
Access BooleanToken Scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - verify
Access BooleanToken Signature - Quickly turn access token signature verification off and on as needed.
- verify
Channel BooleanToken Expiry - verify
Channel BooleanToken Introspection Expiry - Quickly turn on/off the channel token introspection expiry verification.
- verify
Channel BooleanToken Introspection Scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - verify
Channel BooleanToken Scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - verify
Channel BooleanToken Signature - Quickly turn on/off the channel token signature verification.
- access
Token string[]Consumer Bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - access
Token string[]Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - access
Token stringIntrospection Body Args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - access
Token string[]Introspection Consumer Bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- access
Token string[]Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - access
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - access
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - access
Token string[]Introspection Jwt Claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - access
Token numberIntrospection Leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - access
Token string[]Introspection Scopes Claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - access
Token string[]Introspection Scopes Requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - access
Token numberIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - access
Token stringIssuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - access
Token stringJwks Uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- access
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - access
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- access
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- access
Token numberJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - access
Token stringKeyset - The name of the keyset containing signing keys.
- access
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - access
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- access
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- access
Token numberKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - access
Token numberLeeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - access
Token booleanOptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - access
Token stringRequest Header - This parameter tells the name of the header where to look for the access token.
- access
Token string[]Scopes Claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - access
Token string[]Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - access
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - access
Token stringUpstream Header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - access
Token numberUpstream Leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - add
Access {[key: string]: string}Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Channel {[key: string]: string}Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Claims {[key: string]: string} - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cache
Access booleanToken Introspection - Whether to cache access token introspection results.
- cache
Channel booleanToken Introspection - Whether to cache channel token introspection results.
- channel
Token string[]Consumer Bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - channel
Token string[]Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - string
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - channel
Token stringIntrospection Body Args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - channel
Token string[]Introspection Consumer Bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - channel
Token string[]Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - channel
Token stringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - channel
Token stringIntrospection Hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - channel
Token string[]Introspection Jwt Claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - channel
Token numberIntrospection Leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - channel
Token string[]Introspection Scopes Claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - channel
Token string[]Introspection Scopes Requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - channel
Token numberIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - channel
Token stringIssuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - channel
Token stringJwks Uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - channel
Token stringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - channel
Token stringJwks Uri Client Password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channel
Token stringJwks Uri Client Username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channel
Token numberJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - channel
Token stringKeyset - The name of the keyset containing signing keys.
- channel
Token stringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - channel
Token stringKeyset Client Password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channel
Token stringKeyset Client Username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channel
Token numberKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - channel
Token numberLeeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - channel
Token booleanOptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - channel
Token stringRequest Header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - channel
Token string[]Scopes Claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - channel
Token string[]Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - channel
Token stringSigning Algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - channel
Token stringUpstream Header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - channel
Token numberUpstream Leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - enable
Access booleanToken Introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - enable
Channel booleanToken Introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - enable
Hs booleanSignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - enable
Instrumentation boolean - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - original
Access stringToken Upstream Header - The HTTP header name used to store the original access token.
- original
Channel stringToken Upstream Header - The HTTP header name used to store the original channel token.
- realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - remove
Access string[]Token Claims - remove claims. It should be an array, and each element is a claim key string.
- remove
Channel string[]Token Claims - remove claims. It should be an array, and each element is a claim key string.
- set
Access {[key: string]: string}Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Channel {[key: string]: string}Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Claims {[key: string]: string} - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trust
Access booleanToken Introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - trust
Channel booleanToken Introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verify
Access booleanToken Expiry - Quickly turn access token expiry verification off and on as needed.
- verify
Access booleanToken Introspection Expiry - Quickly turn access token introspection expiry verification off and on as needed.
- verify
Access booleanToken Introspection Scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - verify
Access booleanToken Scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - verify
Access booleanToken Signature - Quickly turn access token signature verification off and on as needed.
- verify
Channel booleanToken Expiry - verify
Channel booleanToken Introspection Expiry - Quickly turn on/off the channel token introspection expiry verification.
- verify
Channel booleanToken Introspection Scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - verify
Channel booleanToken Scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - verify
Channel booleanToken Signature - Quickly turn on/off the channel token signature verification.
- access_
token_ Sequence[str]consumer_ bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - access_
token_ Sequence[str]consumer_ claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - str
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - access_
token_ strintrospection_ body_ args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - access_
token_ Sequence[str]introspection_ consumer_ bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- access_
token_ Sequence[str]introspection_ consumer_ claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - access_
token_ strintrospection_ endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - access_
token_ strintrospection_ hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - access_
token_ Sequence[str]introspection_ jwt_ claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - access_
token_ floatintrospection_ leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - access_
token_ Sequence[str]introspection_ scopes_ claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - access_
token_ Sequence[str]introspection_ scopes_ requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - access_
token_ floatintrospection_ timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - access_
token_ strissuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - access_
token_ strjwks_ uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- access_
token_ strjwks_ uri_ client_ certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - access_
token_ strjwks_ uri_ client_ password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- access_
token_ strjwks_ uri_ client_ username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- access_
token_ floatjwks_ uri_ rotate_ period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - access_
token_ strkeyset - The name of the keyset containing signing keys.
- access_
token_ strkeyset_ client_ certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - access_
token_ strkeyset_ client_ password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- access_
token_ strkeyset_ client_ username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- access_
token_ floatkeyset_ rotate_ period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - access_
token_ floatleeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - access_
token_ booloptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - access_
token_ strrequest_ header - This parameter tells the name of the header where to look for the access token.
- access_
token_ Sequence[str]scopes_ claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - access_
token_ Sequence[str]scopes_ requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - access_
token_ strsigning_ algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - access_
token_ strupstream_ header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - access_
token_ floatupstream_ leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - add_
access_ Mapping[str, str]token_ claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add_
channel_ Mapping[str, str]token_ claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add_
claims Mapping[str, str] - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cache_
access_ booltoken_ introspection - Whether to cache access token introspection results.
- cache_
channel_ booltoken_ introspection - Whether to cache channel token introspection results.
- channel_
token_ Sequence[str]consumer_ bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - channel_
token_ Sequence[str]consumer_ claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - str
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - channel_
token_ strintrospection_ body_ args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - channel_
token_ Sequence[str]introspection_ consumer_ bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - channel_
token_ Sequence[str]introspection_ consumer_ claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - channel_
token_ strintrospection_ endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - channel_
token_ strintrospection_ hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - channel_
token_ Sequence[str]introspection_ jwt_ claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - channel_
token_ floatintrospection_ leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - channel_
token_ Sequence[str]introspection_ scopes_ claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - channel_
token_ Sequence[str]introspection_ scopes_ requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - channel_
token_ floatintrospection_ timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - channel_
token_ strissuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - channel_
token_ strjwks_ uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - channel_
token_ strjwks_ uri_ client_ certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - channel_
token_ strjwks_ uri_ client_ password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channel_
token_ strjwks_ uri_ client_ username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channel_
token_ floatjwks_ uri_ rotate_ period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - channel_
token_ strkeyset - The name of the keyset containing signing keys.
- channel_
token_ strkeyset_ client_ certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - channel_
token_ strkeyset_ client_ password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channel_
token_ strkeyset_ client_ username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channel_
token_ floatkeyset_ rotate_ period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - channel_
token_ floatleeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - channel_
token_ booloptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - channel_
token_ strrequest_ header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - channel_
token_ Sequence[str]scopes_ claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - channel_
token_ Sequence[str]scopes_ requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - channel_
token_ strsigning_ algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - channel_
token_ strupstream_ header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - channel_
token_ floatupstream_ leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - enable_
access_ booltoken_ introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - enable_
channel_ booltoken_ introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - enable_
hs_ boolsignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - enable_
instrumentation bool - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - original_
access_ strtoken_ upstream_ header - The HTTP header name used to store the original access token.
- original_
channel_ strtoken_ upstream_ header - The HTTP header name used to store the original channel token.
- realm str
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - remove_
access_ Sequence[str]token_ claims - remove claims. It should be an array, and each element is a claim key string.
- remove_
channel_ Sequence[str]token_ claims - remove claims. It should be an array, and each element is a claim key string.
- set_
access_ Mapping[str, str]token_ claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set_
channel_ Mapping[str, str]token_ claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set_
claims Mapping[str, str] - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trust_
access_ booltoken_ introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - trust_
channel_ booltoken_ introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verify_
access_ booltoken_ expiry - Quickly turn access token expiry verification off and on as needed.
- verify_
access_ booltoken_ introspection_ expiry - Quickly turn access token introspection expiry verification off and on as needed.
- verify_
access_ booltoken_ introspection_ scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - verify_
access_ booltoken_ scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - verify_
access_ booltoken_ signature - Quickly turn access token signature verification off and on as needed.
- verify_
channel_ booltoken_ expiry - verify_
channel_ booltoken_ introspection_ expiry - Quickly turn on/off the channel token introspection expiry verification.
- verify_
channel_ booltoken_ introspection_ scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - verify_
channel_ booltoken_ scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - verify_
channel_ booltoken_ signature - Quickly turn on/off the channel token signature verification.
- access
Token List<String>Consumer Bies - When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are
id
,username
, andcustom_id
. - access
Token List<String>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example,
sub
orusername
) in an access token to Kong consumer entity. - String
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the
Authorization
header's value with this configuration parameter. - access
Token StringIntrospection Body Args - This parameter allows you to pass URL encoded request body arguments. For example:
resource=
ora=1&b=&c
. - access
Token List<String>Introspection Consumer Bies - When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- access
Token List<String>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in access token introspection results to the Kong consumer entity. - access
Token StringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. - access
Token StringIntrospection Hint - If you need to give
hint
parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token
. - access
Token List<String>Introspection Jwt Claims - If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (
JSON
). If the key cannot be found, the plugin responds with401 Unauthorized
. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized
. - access
Token NumberIntrospection Leeway - Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiry
verification altogether withconfig.verify_access_token_introspection_expiry
. - access
Token List<String>Introspection Scopes Claims - Specify the claim/property in access token introspection results (
JSON
) to be verified against values ofconfig.access_token_introspection_scopes_required
. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ]
, hich can be given asrealm_access,roles
(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required
, the plugin responds with403 Forbidden
. - access
Token List<String>Introspection Scopes Requireds - Specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.access_token_introspection_scopes_claim
. - access
Token NumberIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on access token introspection. - access
Token StringIssuer - The
iss
claim of a signed or re-signed access token is set to this value. Originaliss
claim of the incoming token (possibly introspected) is stored inoriginal_iss
claim of the newly signed access token. - access
Token StringJwks Uri - Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- access
Token StringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - access
Token StringJwks Uri Client Password - The client password that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- access
Token StringJwks Uri Client Username - The client username that will be used to authenticate Kong if
access_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- access
Token NumberJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_jwks_uri
. The default value 0 means no auto-rotation. - access
Token StringKeyset - The name of the keyset containing signing keys.
- access
Token StringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_keyset
is an https uri that requires mTLS Auth. - access
Token StringKeyset Client Password - The client password that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- access
Token StringKeyset Client Username - The client username that will be used to authenticate Kong if
access_token_keyset
is a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- access
Token NumberKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
access_token_keyset
. The default value 0 means no auto-rotation. - access
Token NumberLeeway - Adjusts clock skew between the token issuer and Kong. The value is added to the token's
exp
claim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiry
verification altogether withconfig.verify_access_token_expiry
. - access
Token BooleanOptional - If an access token is not provided or no
config.access_token_request_header
is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect - access
Token StringRequest Header - This parameter tells the name of the header where to look for the access token.
- access
Token List<String>Scopes Claims - Specify the claim in an access token to verify against values of
config.access_token_scopes_required
. - access
Token List<String>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.access_token_scopes_claim
. - access
Token StringSigning Algorithm - When this plugin sets the upstream header as specified with
config.access_token_upstream_header
, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuer
specifies whichkeyset
is used to sign the new token issued by Kong using the specified signing algorithm. - access
Token StringUpstream Header - Removes the
config.access_token_request_header
from the request after reading its value. Withconfig.access_token_upstream_header
, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenull
or""
(empty string), the plugin does not even try to sign or re-sign the token. - access
Token NumberUpstream Leeway - If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's
exp
claim. - add
Access Map<String>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Channel Map<String>Token Claims - Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add
Claims Map<String> - Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cache
Access BooleanToken Introspection - Whether to cache access token introspection results.
- cache
Channel BooleanToken Introspection - Whether to cache channel token introspection results.
- channel
Token List<String>Consumer Bies - When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values:
id
,username
, andcustom_id
. - channel
Token List<String>Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an
id
, ausername
, and acustom_id
. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden
. - String
- When using
opaque
channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorized
when using opaque channel tokens. - channel
Token StringIntrospection Body Args - If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example:
resource=
ora=1&b=&c
. - channel
Token List<String>Introspection Consumer Bies - When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are
id
,username
andcustom_id
. - channel
Token List<String>Introspection Consumer Claims - When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as
sub
orusername
) in channel token introspection results to Kong consumer entity - channel
Token StringIntrospection Endpoint - When you use
opaque
access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorized
instead. - channel
Token StringIntrospection Hint - If you need to give
hint
parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahint
isn't sent with channel token introspection. - channel
Token List<String>Introspection Jwt Claims - If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (
JSON
), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong. - channel
Token NumberIntrospection Leeway - You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (
JSON
)exp
claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiry
verification altogether withconfig.verify_channel_token_introspection_expiry
. - channel
Token List<String>Introspection Scopes Claims - Use this parameter to specify the claim/property in channel token introspection results (
JSON
) to be verified against values ofconfig.channel_token_introspection_scopes_required
. This supports nested claims. - channel
Token List<String>Introspection Scopes Requireds - Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by
config.channel_token_introspection_scopes_claim
. - channel
Token NumberIntrospection Timeout - Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the
config.access_token_introspection_timeout
on channel token introspection. - channel
Token StringIssuer - The
iss
claim of the re-signed channel token is set to this value, which iskong
by default. The originaliss
claim of the incoming token (possibly introspected) is stored in theoriginal_iss
claim of the newly signed channel token. - channel
Token StringJwks Uri - If you want to use
config.verify_channel_token_signature
, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized
. - channel
Token StringJwks Uri Client Certificate - The client certificate that will be used to authenticate Kong if
access_token_jwks_uri
is an https uri that requires mTLS Auth. - channel
Token StringJwks Uri Client Password - The client password that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channel
Token StringJwks Uri Client Username - The client username that will be used to authenticate Kong if
channel_token_jwks_uri
is a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channel
Token NumberJwks Uri Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_jwks_uri
. The default value 0 means no auto-rotation. - channel
Token StringKeyset - The name of the keyset containing signing keys.
- channel
Token StringKeyset Client Certificate - The client certificate that will be used to authenticate Kong if
channel_token_keyset
is an https uri that requires mTLS Auth. - channel
Token StringKeyset Client Password - The client password that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channel
Token StringKeyset Client Username - The client username that will be used to authenticate Kong if
channel_token_keyset
is a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channel
Token NumberKeyset Rotate Period - Specify the period (in seconds) to auto-rotate the jwks for
channel_token_keyset
. The default value 0 means no auto-rotation. - channel
Token NumberLeeway - Adjusts clock skew between the token issuer and Kong. The value will be added to token's
exp
claim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiry
verification altogether withconfig.verify_channel_token_expiry
. - channel
Token BooleanOptional - If a channel token is not provided or no
config.channel_token_request_header
is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized
(client didn't send a token) or500 Unexpected
(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect - channel
Token StringRequest Header - This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to
null
or""
(empty string). - channel
Token List<String>Scopes Claims - Specify the claim in a channel token to verify against values of
config.channel_token_scopes_required
. This supports nested claims. - channel
Token List<String>Scopes Requireds - Specify the required values (or scopes) that are checked by a claim specified by
config.channel_token_scopes_claim
. - channel
Token StringSigning Algorithm - When this plugin sets the upstream header as specified with
config.channel_token_upstream_header
, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. - channel
Token StringUpstream Header - This plugin removes the
config.channel_token_request_header
from the request after reading its value. - channel
Token NumberUpstream Leeway - If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's
exp
claim. - enable
Access BooleanToken Introspection - If you don't want to support opaque access tokens, change this configuration parameter to
false
to disable introspection. - enable
Channel BooleanToken Introspection - If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to
false
. - enable
Hs BooleanSignatures - Tokens signed with HMAC algorithms such as
HS256
,HS384
, orHS512
are not accepted by default. If you need to accept such tokens for verification, enable this setting. - enable
Instrumentation Boolean - Writes log entries with some added information using
ngx.CRIT
(CRITICAL) level. - original
Access StringToken Upstream Header - The HTTP header name used to store the original access token.
- original
Channel StringToken Upstream Header - The HTTP header name used to store the original channel token.
- realm String
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an
WWW-Authenticate
header with therealm
attribute value. - remove
Access List<String>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- remove
Channel List<String>Token Claims - remove claims. It should be an array, and each element is a claim key string.
- set
Access Map<String>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Channel Map<String>Token Claims - Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set
Claims Map<String> - Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trust
Access BooleanToken Introspection - Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to
true
, the expiry or scopes are not checked on a payload. - trust
Channel BooleanToken Introspection - Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verify
Access BooleanToken Expiry - Quickly turn access token expiry verification off and on as needed.
- verify
Access BooleanToken Introspection Expiry - Quickly turn access token introspection expiry verification off and on as needed.
- verify
Access BooleanToken Introspection Scopes - Quickly turn off and on the access token introspection scopes verification, specified with
config.access_token_introspection_scopes_required
. - verify
Access BooleanToken Scopes - Quickly turn off and on the access token required scopes verification, specified with
config.access_token_scopes_required
. - verify
Access BooleanToken Signature - Quickly turn access token signature verification off and on as needed.
- verify
Channel BooleanToken Expiry - verify
Channel BooleanToken Introspection Expiry - Quickly turn on/off the channel token introspection expiry verification.
- verify
Channel BooleanToken Introspection Scopes - Quickly turn on/off the channel token introspection scopes verification specified with
config.channel_token_introspection_scopes_required
. - verify
Channel BooleanToken Scopes - Quickly turn on/off the channel token required scopes verification specified with
config.channel_token_scopes_required
. - verify
Channel BooleanToken Signature - Quickly turn on/off the channel token signature verification.
GetGatewayPluginJwtSignerOrdering
GetGatewayPluginJwtSignerOrderingAfter
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginJwtSignerOrderingBefore
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginJwtSignerRoute
- Id string
- Id string
- id String
- id string
- id str
- id String
GetGatewayPluginJwtSignerService
- Id string
- Id string
- id String
- id string
- id str
- id String
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnect
Terraform Provider.