konnect.getGatewayPluginOpenidConnect
Explore with Pulumi AI
Using getGatewayPluginOpenidConnect
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayPluginOpenidConnect(args: GetGatewayPluginOpenidConnectArgs, opts?: InvokeOptions): Promise<GetGatewayPluginOpenidConnectResult>
function getGatewayPluginOpenidConnectOutput(args: GetGatewayPluginOpenidConnectOutputArgs, opts?: InvokeOptions): Output<GetGatewayPluginOpenidConnectResult>
def get_gateway_plugin_openid_connect(control_plane_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetGatewayPluginOpenidConnectResult
def get_gateway_plugin_openid_connect_output(control_plane_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetGatewayPluginOpenidConnectResult]
func LookupGatewayPluginOpenidConnect(ctx *Context, args *LookupGatewayPluginOpenidConnectArgs, opts ...InvokeOption) (*LookupGatewayPluginOpenidConnectResult, error)
func LookupGatewayPluginOpenidConnectOutput(ctx *Context, args *LookupGatewayPluginOpenidConnectOutputArgs, opts ...InvokeOption) LookupGatewayPluginOpenidConnectResultOutput
> Note: This function is named LookupGatewayPluginOpenidConnect
in the Go SDK.
public static class GetGatewayPluginOpenidConnect
{
public static Task<GetGatewayPluginOpenidConnectResult> InvokeAsync(GetGatewayPluginOpenidConnectArgs args, InvokeOptions? opts = null)
public static Output<GetGatewayPluginOpenidConnectResult> Invoke(GetGatewayPluginOpenidConnectInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetGatewayPluginOpenidConnectResult> getGatewayPluginOpenidConnect(GetGatewayPluginOpenidConnectArgs args, InvokeOptions options)
public static Output<GetGatewayPluginOpenidConnectResult> getGatewayPluginOpenidConnect(GetGatewayPluginOpenidConnectArgs args, InvokeOptions options)
fn::invoke:
function: konnect:index/getGatewayPluginOpenidConnect:getGatewayPluginOpenidConnect
arguments:
# arguments dictionary
The following arguments are supported:
- Control
Plane stringId
- Control
Plane stringId
- control
Plane StringId
- control
Plane stringId
- control_
plane_ strid
- control
Plane StringId
getGatewayPluginOpenidConnect Result
The following output properties are available:
- Config
Get
Gateway Plugin Openid Connect Config - Control
Plane stringId - Created
At double - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Openid Connect Ordering - Protocols List<string>
- Route
Get
Gateway Plugin Openid Connect Route - Service
Get
Gateway Plugin Openid Connect Service - List<string>
- Updated
At double
- Config
Get
Gateway Plugin Openid Connect Config - Control
Plane stringId - Created
At float64 - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Openid Connect Ordering - Protocols []string
- Route
Get
Gateway Plugin Openid Connect Route - Service
Get
Gateway Plugin Openid Connect Service - []string
- Updated
At float64
- config
Get
Gateway Plugin Openid Connect Config - control
Plane StringId - created
At Double - enabled Boolean
- id String
- instance
Name String - ordering
Get
Gateway Plugin Openid Connect Ordering - protocols List<String>
- route
Get
Gateway Plugin Openid Connect Route - service
Get
Gateway Plugin Openid Connect Service - List<String>
- updated
At Double
- config
Get
Gateway Plugin Openid Connect Config - control
Plane stringId - created
At number - enabled boolean
- id string
- instance
Name string - ordering
Get
Gateway Plugin Openid Connect Ordering - protocols string[]
- route
Get
Gateway Plugin Openid Connect Route - service
Get
Gateway Plugin Openid Connect Service - string[]
- updated
At number
- config
Get
Gateway Plugin Openid Connect Config - control_
plane_ strid - created_
at float - enabled bool
- id str
- instance_
name str - ordering
Get
Gateway Plugin Openid Connect Ordering - protocols Sequence[str]
- route
Get
Gateway Plugin Openid Connect Route - service
Get
Gateway Plugin Openid Connect Service - Sequence[str]
- updated_
at float
- config Property Map
- control
Plane StringId - created
At Number - enabled Boolean
- id String
- instance
Name String - ordering Property Map
- protocols List<String>
- route Property Map
- service Property Map
- List<String>
- updated
At Number
Supporting Types
GetGatewayPluginOpenidConnectConfig
- Anonymous string
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - Audience
Claims List<string> - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Audience
Requireds List<string> - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Audiences List<string>
- The audience passed to the authorization endpoint.
- Auth
Methods List<string> - Types of credentials/grants to enable.
- Authenticated
Groups List<string>Claims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- string
- The authorization cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The authorization cookie name.
- string
- The authorization cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- string
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - List<string>
- Extra query arguments passed from the client to the authorization endpoint.
- List<string>
- Extra query argument names passed to the authorization endpoint.
- List<string>
- Extra query argument values passed to the authorization endpoint.
- double
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- string
- The name of the cookie in which the bearer token is passed.
- Bearer
Token List<string>Param Types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - By
Username boolIgnore Case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - Cache
Introspection bool - Cache the introspection endpoint requests.
- Cache
Token boolExchange - Cache the token exchange endpoint requests.
- Cache
Tokens bool - Cache the token endpoint requests.
- Cache
Tokens stringSalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- Cache
Ttl double - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- Cache
Ttl doubleMax - The maximum cache ttl in seconds (enforced).
- Cache
Ttl doubleMin - The minimum cache ttl in seconds (enforced).
- Cache
Ttl doubleNeg - The negative cache ttl in seconds.
- Cache
Ttl doubleResurrect - The resurrection ttl in seconds.
- Cache
User boolInfo - Cache the user info requests.
- Claims
Forbiddens List<string> - If given, these claims are forbidden in the token payload.
- Client
Algs List<string> - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- Client
Arg string - The client to use for this request (the selection is made with a request parameter with the same name).
- Client
Auths List<string> - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- Client
Credentials List<string>Param Types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - Client
Ids List<string> - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- Client
Jwks List<GetGateway Plugin Openid Connect Config Client Jwk> - The JWK used for the private_key_jwt authentication.
- Client
Secrets List<string> - The client secret.
- Cluster
Cache GetRedis Gateway Plugin Openid Connect Config Cluster Cache Redis - Cluster
Cache stringStrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- Consumer
Bies List<string> - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - Consumer
Claims List<string> - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Consumer
Optional bool - Do not terminate the request if consumer mapping fails.
- Credential
Claims List<string> - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Disable
Sessions List<string> - Disable issuing the session cookie with the specified grants.
- Discovery
Headers List<string>Names - Extra header names passed to the discovery endpoint.
- Discovery
Headers List<string>Values - Extra header values passed to the discovery endpoint.
- Display
Errors bool - Display errors on failure responses.
- Domains List<string>
- The allowed values for the
hd
claim. - Downstream
Access stringToken Header - The downstream access token header.
- Downstream
Access stringToken Jwk Header - The downstream access token JWK header.
- Downstream
Headers List<string>Claims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Downstream
Headers List<string>Names - The downstream header names for the claim values.
- Downstream
Id stringToken Header - The downstream id token header.
- Downstream
Id stringToken Jwk Header - The downstream id token JWK header.
- Downstream
Introspection stringHeader - The downstream introspection header.
- Downstream
Introspection stringJwt Header - The downstream introspection JWT header.
- Downstream
Refresh stringToken Header - The downstream refresh token header.
- Downstream
Session stringId Header - The downstream session id header.
- Downstream
User stringInfo Header - The downstream user info header.
- Downstream
User stringInfo Jwt Header - The downstream user info JWT header (in case the user info returns a JWT response).
- Dpop
Proof doubleLifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- Dpop
Use boolNonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- Enable
Hs boolSignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- End
Session stringEndpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - Expose
Error boolCode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - Extra
Jwks List<string>Uris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- Forbidden
Destroy boolSession - Destroy any active session for the forbidden requests.
- Forbidden
Error stringMessage - The error message for the forbidden requests (when not using the redirection).
- Forbidden
Redirect List<string>Uris - Where to redirect the client on forbidden requests.
- Groups
Claims List<string> - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Groups
Requireds List<string> - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Hide
Credentials bool - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- Http
Proxy string - The HTTP proxy.
- string
- The HTTP proxy authorization.
- Http
Version double - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - Https
Proxy string - The HTTPS proxy.
- string
- The HTTPS proxy authorization.
- Id
Token stringParam Name - The name of the parameter used to pass the id token.
- Id
Token List<string>Param Types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Ignore
Signatures List<string> - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - Introspect
Jwt boolTokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- Introspection
Accept string - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - Introspection
Check boolActive - Check that the introspection response has an
active
claim with a value oftrue
. - Introspection
Endpoint string - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - Introspection
Endpoint stringAuth Method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Introspection
Headers List<string>Clients - Extra headers passed from the client to the introspection endpoint.
- Introspection
Headers List<string>Names - Extra header names passed to the introspection endpoint.
- Introspection
Headers List<string>Values - Extra header values passed to the introspection endpoint.
- Introspection
Hint string - Introspection hint parameter value passed to the introspection endpoint.
- Introspection
Post List<string>Args Client Headers - Extra post arguments passed from the client headers to the introspection endpoint.
- Introspection
Post List<string>Args Clients - Extra post arguments passed from the client to the introspection endpoint.
- Introspection
Post List<string>Args Names - Extra post argument names passed to the introspection endpoint.
- Introspection
Post List<string>Args Values - Extra post argument values passed to the introspection endpoint.
- Introspection
Token stringParam Name - Designate token's parameter name for introspection.
- Issuer string
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - Issuers
Alloweds List<string> - The issuers allowed to be present in the tokens (
iss
claim). - Jwt
Session stringClaim - The claim to match against the JWT session cookie.
- string
- The name of the JWT session cookie.
- Keepalive bool
- Use keepalive with the HTTP client.
- Leeway double
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - Login
Action string - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - Login
Methods List<string> - Enable login functionality with specified grants.
- Login
Redirect stringMode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - Login
Redirect List<string>Uris - Where to redirect the client when
login_action
is set toredirect
. - Login
Tokens List<string> - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - Logout
Methods List<string> - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - Logout
Post stringArg - The request body argument that activates the logout.
- Logout
Query stringArg - The request query argument that activates the logout.
- Logout
Redirect List<string>Uris - Where to redirect the client after the logout.
- Logout
Revoke bool Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- Logout
Revoke boolAccess Token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - Logout
Revoke boolRefresh Token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - Logout
Uri stringSuffix - The request URI suffix that activates the logout.
- Max
Age double - The maximum age (in seconds) compared to the
auth_time
claim. - Mtls
Introspection stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - Mtls
Revocation stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - Mtls
Token stringEndpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - No
Proxy string - Do not use proxy with these hosts.
- Password
Param List<string>Types - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Preserve
Query boolArgs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- Proof
Of boolPossession Auth Methods Validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- Proof
Of stringPossession Dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- Proof
Of stringPossession Mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- string
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - string
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Redirect
Uris List<string> - The redirect URI passed to the authorization and token endpoints.
- Redis
Get
Gateway Plugin Openid Connect Config Redis - Rediscovery
Lifetime double - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- Refresh
Token stringParam Name - The name of the parameter used to pass the refresh token.
- Refresh
Token List<string>Param Types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Refresh
Tokens bool - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - Require
Proof boolKey For Code Exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - bool
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - Require
Signed boolRequest Object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - Resolve
Distributed boolClaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - Response
Mode string - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - Response
Types List<string> - The response type passed to the authorization endpoint.
- Reverify bool
- Specifies whether to always verify tokens stored in the session.
- Revocation
Endpoint string - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - Revocation
Endpoint stringAuth Method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Revocation
Token stringParam Name - Designate token's parameter name for revocation.
- Roles
Claims List<string> - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Roles
Requireds List<string> - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Run
On boolPreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - Scopes List<string>
- The scopes passed to the authorization and token endpoints.
- Scopes
Claims List<string> - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Scopes
Requireds List<string> - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Search
User boolInfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- Session
Absolute doubleTimeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- Session
Audience string - The session audience, which is the intended target application. For example
"my-application"
. - string
- The session cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The session cookie name.
- string
- The session cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- Session
Enforce boolSame Subject - When set to
true
, audiences are forced to share the same subject. - Session
Hash boolStorage Key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - Session
Hash boolSubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - Session
Idling doubleTimeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- Session
Memcached stringHost - The memcached host.
- Session
Memcached doublePort - The memcached port.
- Session
Memcached stringPrefix - The memcached session key prefix.
- Session
Memcached stringSocket - The memcached unix socket path.
- Session
Remember bool - Enables or disables persistent sessions.
- Session
Remember doubleAbsolute Timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- string
- Persistent session cookie name. Use with the
remember
configuration parameter. - Session
Remember doubleRolling Timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- Session
Request List<string>Headers - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - Session
Response List<string>Headers - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - Session
Rolling doubleTimeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- Session
Secret string - The session secret.
- Session
Storage string - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - Session
Store boolMetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- Ssl
Verify bool - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - Timeout double
- Network IO timeout in milliseconds.
- Tls
Client stringAuth Cert Id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- Tls
Client boolAuth Ssl Verify - Verify identity provider server certificate during mTLS client authentication.
- Token
Cache boolKey Include Scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- Token
Endpoint string - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - Token
Endpoint stringAuth Method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Token
Exchange stringEndpoint - The token exchange endpoint.
- Token
Headers List<string>Clients - Extra headers passed from the client to the token endpoint.
- Token
Headers List<string>Grants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - Token
Headers List<string>Names - Extra header names passed to the token endpoint.
- Token
Headers stringPrefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- Token
Headers List<string>Replays - The names of token endpoint response headers to forward to the downstream client.
- Token
Headers List<string>Values - Extra header values passed to the token endpoint.
- Token
Post List<string>Args Clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - Token
Post List<string>Args Names - Extra post argument names passed to the token endpoint.
- Token
Post List<string>Args Values - Extra post argument values passed to the token endpoint.
- bool
- Destroy any active session for the unauthorized requests.
- string
- The error message for the unauthorized requests (when not using the redirection).
- List<string>
- Where to redirect the client on unauthorized requests.
- Unexpected
Redirect List<string>Uris - Where to redirect the client when unexpected errors happen with the requests.
- Upstream
Access stringToken Header - The upstream access token header.
- Upstream
Access stringToken Jwk Header - The upstream access token JWK header.
- Upstream
Headers List<string>Claims - The upstream header claims. Only top level claims are supported.
- Upstream
Headers List<string>Names - The upstream header names for the claim values.
- Upstream
Id stringToken Header - The upstream id token header.
- Upstream
Id stringToken Jwk Header - The upstream id token JWK header.
- Upstream
Introspection stringHeader - The upstream introspection header.
- Upstream
Introspection stringJwt Header - The upstream introspection JWT header.
- Upstream
Refresh stringToken Header - The upstream refresh token header.
- Upstream
Session stringId Header - The upstream session id header.
- Upstream
User stringInfo Header - The upstream user info header.
- Upstream
User stringInfo Jwt Header - The upstream user info JWT header (in case the user info returns a JWT response).
- Userinfo
Accept string - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - Userinfo
Endpoint string - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - Userinfo
Headers List<string>Clients - Extra headers passed from the client to the user info endpoint.
- Userinfo
Headers List<string>Names - Extra header names passed to the user info endpoint.
- Userinfo
Headers List<string>Values - Extra header values passed to the user info endpoint.
- Userinfo
Query List<string>Args Clients - Extra query arguments passed from the client to the user info endpoint.
- Userinfo
Query List<string>Args Names - Extra query argument names passed to the user info endpoint.
- Userinfo
Query List<string>Args Values - Extra query argument values passed to the user info endpoint.
- Using
Pseudo boolIssuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - Verify
Claims bool - Verify tokens for standard claims.
- Verify
Nonce bool - Verify nonce on authorization code flow.
- Verify
Parameters bool - Verify plugin configuration against discovery.
- Verify
Signature bool - Verify signature of tokens.
- Anonymous string
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - Audience
Claims []string - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Audience
Requireds []string - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Audiences []string
- The audience passed to the authorization endpoint.
- Auth
Methods []string - Types of credentials/grants to enable.
- Authenticated
Groups []stringClaims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- string
- The authorization cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The authorization cookie name.
- string
- The authorization cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- string
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - []string
- Extra query arguments passed from the client to the authorization endpoint.
- []string
- Extra query argument names passed to the authorization endpoint.
- []string
- Extra query argument values passed to the authorization endpoint.
- float64
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- string
- The name of the cookie in which the bearer token is passed.
- Bearer
Token []stringParam Types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - By
Username boolIgnore Case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - Cache
Introspection bool - Cache the introspection endpoint requests.
- Cache
Token boolExchange - Cache the token exchange endpoint requests.
- Cache
Tokens bool - Cache the token endpoint requests.
- Cache
Tokens stringSalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- Cache
Ttl float64 - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- Cache
Ttl float64Max - The maximum cache ttl in seconds (enforced).
- Cache
Ttl float64Min - The minimum cache ttl in seconds (enforced).
- Cache
Ttl float64Neg - The negative cache ttl in seconds.
- Cache
Ttl float64Resurrect - The resurrection ttl in seconds.
- Cache
User boolInfo - Cache the user info requests.
- Claims
Forbiddens []string - If given, these claims are forbidden in the token payload.
- Client
Algs []string - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- Client
Arg string - The client to use for this request (the selection is made with a request parameter with the same name).
- Client
Auths []string - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- Client
Credentials []stringParam Types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - Client
Ids []string - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- Client
Jwks []GetGateway Plugin Openid Connect Config Client Jwk - The JWK used for the private_key_jwt authentication.
- Client
Secrets []string - The client secret.
- Cluster
Cache GetRedis Gateway Plugin Openid Connect Config Cluster Cache Redis - Cluster
Cache stringStrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- Consumer
Bies []string - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - Consumer
Claims []string - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Consumer
Optional bool - Do not terminate the request if consumer mapping fails.
- Credential
Claims []string - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Disable
Sessions []string - Disable issuing the session cookie with the specified grants.
- Discovery
Headers []stringNames - Extra header names passed to the discovery endpoint.
- Discovery
Headers []stringValues - Extra header values passed to the discovery endpoint.
- Display
Errors bool - Display errors on failure responses.
- Domains []string
- The allowed values for the
hd
claim. - Downstream
Access stringToken Header - The downstream access token header.
- Downstream
Access stringToken Jwk Header - The downstream access token JWK header.
- Downstream
Headers []stringClaims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Downstream
Headers []stringNames - The downstream header names for the claim values.
- Downstream
Id stringToken Header - The downstream id token header.
- Downstream
Id stringToken Jwk Header - The downstream id token JWK header.
- Downstream
Introspection stringHeader - The downstream introspection header.
- Downstream
Introspection stringJwt Header - The downstream introspection JWT header.
- Downstream
Refresh stringToken Header - The downstream refresh token header.
- Downstream
Session stringId Header - The downstream session id header.
- Downstream
User stringInfo Header - The downstream user info header.
- Downstream
User stringInfo Jwt Header - The downstream user info JWT header (in case the user info returns a JWT response).
- Dpop
Proof float64Lifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- Dpop
Use boolNonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- Enable
Hs boolSignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- End
Session stringEndpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - Expose
Error boolCode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - Extra
Jwks []stringUris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- Forbidden
Destroy boolSession - Destroy any active session for the forbidden requests.
- Forbidden
Error stringMessage - The error message for the forbidden requests (when not using the redirection).
- Forbidden
Redirect []stringUris - Where to redirect the client on forbidden requests.
- Groups
Claims []string - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Groups
Requireds []string - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Hide
Credentials bool - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- Http
Proxy string - The HTTP proxy.
- string
- The HTTP proxy authorization.
- Http
Version float64 - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - Https
Proxy string - The HTTPS proxy.
- string
- The HTTPS proxy authorization.
- Id
Token stringParam Name - The name of the parameter used to pass the id token.
- Id
Token []stringParam Types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Ignore
Signatures []string - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - Introspect
Jwt boolTokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- Introspection
Accept string - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - Introspection
Check boolActive - Check that the introspection response has an
active
claim with a value oftrue
. - Introspection
Endpoint string - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - Introspection
Endpoint stringAuth Method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Introspection
Headers []stringClients - Extra headers passed from the client to the introspection endpoint.
- Introspection
Headers []stringNames - Extra header names passed to the introspection endpoint.
- Introspection
Headers []stringValues - Extra header values passed to the introspection endpoint.
- Introspection
Hint string - Introspection hint parameter value passed to the introspection endpoint.
- Introspection
Post []stringArgs Client Headers - Extra post arguments passed from the client headers to the introspection endpoint.
- Introspection
Post []stringArgs Clients - Extra post arguments passed from the client to the introspection endpoint.
- Introspection
Post []stringArgs Names - Extra post argument names passed to the introspection endpoint.
- Introspection
Post []stringArgs Values - Extra post argument values passed to the introspection endpoint.
- Introspection
Token stringParam Name - Designate token's parameter name for introspection.
- Issuer string
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - Issuers
Alloweds []string - The issuers allowed to be present in the tokens (
iss
claim). - Jwt
Session stringClaim - The claim to match against the JWT session cookie.
- string
- The name of the JWT session cookie.
- Keepalive bool
- Use keepalive with the HTTP client.
- Leeway float64
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - Login
Action string - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - Login
Methods []string - Enable login functionality with specified grants.
- Login
Redirect stringMode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - Login
Redirect []stringUris - Where to redirect the client when
login_action
is set toredirect
. - Login
Tokens []string - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - Logout
Methods []string - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - Logout
Post stringArg - The request body argument that activates the logout.
- Logout
Query stringArg - The request query argument that activates the logout.
- Logout
Redirect []stringUris - Where to redirect the client after the logout.
- Logout
Revoke bool Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- Logout
Revoke boolAccess Token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - Logout
Revoke boolRefresh Token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - Logout
Uri stringSuffix - The request URI suffix that activates the logout.
- Max
Age float64 - The maximum age (in seconds) compared to the
auth_time
claim. - Mtls
Introspection stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - Mtls
Revocation stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - Mtls
Token stringEndpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - No
Proxy string - Do not use proxy with these hosts.
- Password
Param []stringTypes - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Preserve
Query boolArgs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- Proof
Of boolPossession Auth Methods Validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- Proof
Of stringPossession Dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- Proof
Of stringPossession Mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- string
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - string
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Redirect
Uris []string - The redirect URI passed to the authorization and token endpoints.
- Redis
Get
Gateway Plugin Openid Connect Config Redis - Rediscovery
Lifetime float64 - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- Refresh
Token stringParam Name - The name of the parameter used to pass the refresh token.
- Refresh
Token []stringParam Types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - Refresh
Tokens bool - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - Require
Proof boolKey For Code Exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - bool
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - Require
Signed boolRequest Object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - Resolve
Distributed boolClaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - Response
Mode string - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - Response
Types []string - The response type passed to the authorization endpoint.
- Reverify bool
- Specifies whether to always verify tokens stored in the session.
- Revocation
Endpoint string - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - Revocation
Endpoint stringAuth Method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Revocation
Token stringParam Name - Designate token's parameter name for revocation.
- Roles
Claims []string - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Roles
Requireds []string - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Run
On boolPreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - Scopes []string
- The scopes passed to the authorization and token endpoints.
- Scopes
Claims []string - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- Scopes
Requireds []string - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - Search
User boolInfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- Session
Absolute float64Timeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- Session
Audience string - The session audience, which is the intended target application. For example
"my-application"
. - string
- The session cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The session cookie name.
- string
- The session cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- Session
Enforce boolSame Subject - When set to
true
, audiences are forced to share the same subject. - Session
Hash boolStorage Key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - Session
Hash boolSubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - Session
Idling float64Timeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- Session
Memcached stringHost - The memcached host.
- Session
Memcached float64Port - The memcached port.
- Session
Memcached stringPrefix - The memcached session key prefix.
- Session
Memcached stringSocket - The memcached unix socket path.
- Session
Remember bool - Enables or disables persistent sessions.
- Session
Remember float64Absolute Timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- string
- Persistent session cookie name. Use with the
remember
configuration parameter. - Session
Remember float64Rolling Timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- Session
Request []stringHeaders - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - Session
Response []stringHeaders - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - Session
Rolling float64Timeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- Session
Secret string - The session secret.
- Session
Storage string - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - Session
Store boolMetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- Ssl
Verify bool - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - Timeout float64
- Network IO timeout in milliseconds.
- Tls
Client stringAuth Cert Id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- Tls
Client boolAuth Ssl Verify - Verify identity provider server certificate during mTLS client authentication.
- Token
Cache boolKey Include Scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- Token
Endpoint string - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - Token
Endpoint stringAuth Method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - Token
Exchange stringEndpoint - The token exchange endpoint.
- Token
Headers []stringClients - Extra headers passed from the client to the token endpoint.
- Token
Headers []stringGrants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - Token
Headers []stringNames - Extra header names passed to the token endpoint.
- Token
Headers stringPrefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- Token
Headers []stringReplays - The names of token endpoint response headers to forward to the downstream client.
- Token
Headers []stringValues - Extra header values passed to the token endpoint.
- Token
Post []stringArgs Clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - Token
Post []stringArgs Names - Extra post argument names passed to the token endpoint.
- Token
Post []stringArgs Values - Extra post argument values passed to the token endpoint.
- bool
- Destroy any active session for the unauthorized requests.
- string
- The error message for the unauthorized requests (when not using the redirection).
- []string
- Where to redirect the client on unauthorized requests.
- Unexpected
Redirect []stringUris - Where to redirect the client when unexpected errors happen with the requests.
- Upstream
Access stringToken Header - The upstream access token header.
- Upstream
Access stringToken Jwk Header - The upstream access token JWK header.
- Upstream
Headers []stringClaims - The upstream header claims. Only top level claims are supported.
- Upstream
Headers []stringNames - The upstream header names for the claim values.
- Upstream
Id stringToken Header - The upstream id token header.
- Upstream
Id stringToken Jwk Header - The upstream id token JWK header.
- Upstream
Introspection stringHeader - The upstream introspection header.
- Upstream
Introspection stringJwt Header - The upstream introspection JWT header.
- Upstream
Refresh stringToken Header - The upstream refresh token header.
- Upstream
Session stringId Header - The upstream session id header.
- Upstream
User stringInfo Header - The upstream user info header.
- Upstream
User stringInfo Jwt Header - The upstream user info JWT header (in case the user info returns a JWT response).
- Userinfo
Accept string - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - Userinfo
Endpoint string - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - Userinfo
Headers []stringClients - Extra headers passed from the client to the user info endpoint.
- Userinfo
Headers []stringNames - Extra header names passed to the user info endpoint.
- Userinfo
Headers []stringValues - Extra header values passed to the user info endpoint.
- Userinfo
Query []stringArgs Clients - Extra query arguments passed from the client to the user info endpoint.
- Userinfo
Query []stringArgs Names - Extra query argument names passed to the user info endpoint.
- Userinfo
Query []stringArgs Values - Extra query argument values passed to the user info endpoint.
- Using
Pseudo boolIssuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - Verify
Claims bool - Verify tokens for standard claims.
- Verify
Nonce bool - Verify nonce on authorization code flow.
- Verify
Parameters bool - Verify plugin configuration against discovery.
- Verify
Signature bool - Verify signature of tokens.
- anonymous String
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - audience
Claims List<String> - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- audience
Requireds List<String> - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - audiences List<String>
- The audience passed to the authorization endpoint.
- auth
Methods List<String> - Types of credentials/grants to enable.
- authenticated
Groups List<String>Claims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- String
- The authorization cookie Domain flag.
- Boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - String
- The authorization cookie name.
- String
- The authorization cookie Path flag.
- String
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- Boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- String
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - List<String>
- Extra query arguments passed from the client to the authorization endpoint.
- List<String>
- Extra query argument names passed to the authorization endpoint.
- List<String>
- Extra query argument values passed to the authorization endpoint.
- Double
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- String
- The name of the cookie in which the bearer token is passed.
- bearer
Token List<String>Param Types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - by
Username BooleanIgnore Case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - cache
Introspection Boolean - Cache the introspection endpoint requests.
- cache
Token BooleanExchange - Cache the token exchange endpoint requests.
- cache
Tokens Boolean - Cache the token endpoint requests.
- cache
Tokens StringSalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- cache
Ttl Double - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- cache
Ttl DoubleMax - The maximum cache ttl in seconds (enforced).
- cache
Ttl DoubleMin - The minimum cache ttl in seconds (enforced).
- cache
Ttl DoubleNeg - The negative cache ttl in seconds.
- cache
Ttl DoubleResurrect - The resurrection ttl in seconds.
- cache
User BooleanInfo - Cache the user info requests.
- claims
Forbiddens List<String> - If given, these claims are forbidden in the token payload.
- client
Algs List<String> - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- client
Arg String - The client to use for this request (the selection is made with a request parameter with the same name).
- client
Auths List<String> - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- client
Credentials List<String>Param Types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - client
Ids List<String> - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- client
Jwks List<GetGateway Plugin Openid Connect Config Client Jwk> - The JWK used for the private_key_jwt authentication.
- client
Secrets List<String> - The client secret.
- cluster
Cache GetRedis Gateway Plugin Openid Connect Config Cluster Cache Redis - cluster
Cache StringStrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- consumer
Bies List<String> - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - consumer
Claims List<String> - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- consumer
Optional Boolean - Do not terminate the request if consumer mapping fails.
- credential
Claims List<String> - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- disable
Sessions List<String> - Disable issuing the session cookie with the specified grants.
- discovery
Headers List<String>Names - Extra header names passed to the discovery endpoint.
- discovery
Headers List<String>Values - Extra header values passed to the discovery endpoint.
- display
Errors Boolean - Display errors on failure responses.
- domains List<String>
- The allowed values for the
hd
claim. - downstream
Access StringToken Header - The downstream access token header.
- downstream
Access StringToken Jwk Header - The downstream access token JWK header.
- downstream
Headers List<String>Claims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- downstream
Headers List<String>Names - The downstream header names for the claim values.
- downstream
Id StringToken Header - The downstream id token header.
- downstream
Id StringToken Jwk Header - The downstream id token JWK header.
- downstream
Introspection StringHeader - The downstream introspection header.
- downstream
Introspection StringJwt Header - The downstream introspection JWT header.
- downstream
Refresh StringToken Header - The downstream refresh token header.
- downstream
Session StringId Header - The downstream session id header.
- downstream
User StringInfo Header - The downstream user info header.
- downstream
User StringInfo Jwt Header - The downstream user info JWT header (in case the user info returns a JWT response).
- dpop
Proof DoubleLifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- dpop
Use BooleanNonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- enable
Hs BooleanSignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- end
Session StringEndpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - expose
Error BooleanCode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - extra
Jwks List<String>Uris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- forbidden
Destroy BooleanSession - Destroy any active session for the forbidden requests.
- forbidden
Error StringMessage - The error message for the forbidden requests (when not using the redirection).
- forbidden
Redirect List<String>Uris - Where to redirect the client on forbidden requests.
- groups
Claims List<String> - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- groups
Requireds List<String> - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - hide
Credentials Boolean - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- http
Proxy String - The HTTP proxy.
- String
- The HTTP proxy authorization.
- http
Version Double - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - https
Proxy String - The HTTPS proxy.
- String
- The HTTPS proxy authorization.
- id
Token StringParam Name - The name of the parameter used to pass the id token.
- id
Token List<String>Param Types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - ignore
Signatures List<String> - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - introspect
Jwt BooleanTokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- introspection
Accept String - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - introspection
Check BooleanActive - Check that the introspection response has an
active
claim with a value oftrue
. - introspection
Endpoint String - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - introspection
Endpoint StringAuth Method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - introspection
Headers List<String>Clients - Extra headers passed from the client to the introspection endpoint.
- introspection
Headers List<String>Names - Extra header names passed to the introspection endpoint.
- introspection
Headers List<String>Values - Extra header values passed to the introspection endpoint.
- introspection
Hint String - Introspection hint parameter value passed to the introspection endpoint.
- introspection
Post List<String>Args Client Headers - Extra post arguments passed from the client headers to the introspection endpoint.
- introspection
Post List<String>Args Clients - Extra post arguments passed from the client to the introspection endpoint.
- introspection
Post List<String>Args Names - Extra post argument names passed to the introspection endpoint.
- introspection
Post List<String>Args Values - Extra post argument values passed to the introspection endpoint.
- introspection
Token StringParam Name - Designate token's parameter name for introspection.
- issuer String
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - issuers
Alloweds List<String> - The issuers allowed to be present in the tokens (
iss
claim). - jwt
Session StringClaim - The claim to match against the JWT session cookie.
- String
- The name of the JWT session cookie.
- keepalive Boolean
- Use keepalive with the HTTP client.
- leeway Double
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - login
Action String - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - login
Methods List<String> - Enable login functionality with specified grants.
- login
Redirect StringMode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - login
Redirect List<String>Uris - Where to redirect the client when
login_action
is set toredirect
. - login
Tokens List<String> - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - logout
Methods List<String> - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - logout
Post StringArg - The request body argument that activates the logout.
- logout
Query StringArg - The request query argument that activates the logout.
- logout
Redirect List<String>Uris - Where to redirect the client after the logout.
- logout
Revoke Boolean Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- logout
Revoke BooleanAccess Token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Revoke BooleanRefresh Token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Uri StringSuffix - The request URI suffix that activates the logout.
- max
Age Double - The maximum age (in seconds) compared to the
auth_time
claim. - mtls
Introspection StringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Revocation StringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Token StringEndpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - no
Proxy String - Do not use proxy with these hosts.
- password
Param List<String>Types - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - preserve
Query BooleanArgs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- proof
Of BooleanPossession Auth Methods Validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- proof
Of StringPossession Dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- proof
Of StringPossession Mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- String
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - String
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - redirect
Uris List<String> - The redirect URI passed to the authorization and token endpoints.
- redis
Get
Gateway Plugin Openid Connect Config Redis - rediscovery
Lifetime Double - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- refresh
Token StringParam Name - The name of the parameter used to pass the refresh token.
- refresh
Token List<String>Param Types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - refresh
Tokens Boolean - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - require
Proof BooleanKey For Code Exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - Boolean
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - require
Signed BooleanRequest Object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - resolve
Distributed BooleanClaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - response
Mode String - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - response
Types List<String> - The response type passed to the authorization endpoint.
- reverify Boolean
- Specifies whether to always verify tokens stored in the session.
- revocation
Endpoint String - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - revocation
Endpoint StringAuth Method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - revocation
Token StringParam Name - Designate token's parameter name for revocation.
- roles
Claims List<String> - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- roles
Requireds List<String> - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - run
On BooleanPreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - scopes List<String>
- The scopes passed to the authorization and token endpoints.
- scopes
Claims List<String> - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- scopes
Requireds List<String> - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - search
User BooleanInfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- session
Absolute DoubleTimeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- session
Audience String - The session audience, which is the intended target application. For example
"my-application"
. - String
- The session cookie Domain flag.
- Boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - String
- The session cookie name.
- String
- The session cookie Path flag.
- String
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- Boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- session
Enforce BooleanSame Subject - When set to
true
, audiences are forced to share the same subject. - session
Hash BooleanStorage Key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - session
Hash BooleanSubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - session
Idling DoubleTimeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- session
Memcached StringHost - The memcached host.
- session
Memcached DoublePort - The memcached port.
- session
Memcached StringPrefix - The memcached session key prefix.
- session
Memcached StringSocket - The memcached unix socket path.
- session
Remember Boolean - Enables or disables persistent sessions.
- session
Remember DoubleAbsolute Timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- String
- Persistent session cookie name. Use with the
remember
configuration parameter. - session
Remember DoubleRolling Timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- session
Request List<String>Headers - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - session
Response List<String>Headers - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - session
Rolling DoubleTimeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- session
Secret String - The session secret.
- session
Storage String - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - session
Store BooleanMetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- ssl
Verify Boolean - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - timeout Double
- Network IO timeout in milliseconds.
- tls
Client StringAuth Cert Id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- tls
Client BooleanAuth Ssl Verify - Verify identity provider server certificate during mTLS client authentication.
- token
Cache BooleanKey Include Scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- token
Endpoint String - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - token
Endpoint StringAuth Method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - token
Exchange StringEndpoint - The token exchange endpoint.
- token
Headers List<String>Clients - Extra headers passed from the client to the token endpoint.
- token
Headers List<String>Grants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - token
Headers List<String>Names - Extra header names passed to the token endpoint.
- token
Headers StringPrefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- token
Headers List<String>Replays - The names of token endpoint response headers to forward to the downstream client.
- token
Headers List<String>Values - Extra header values passed to the token endpoint.
- token
Post List<String>Args Clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - token
Post List<String>Args Names - Extra post argument names passed to the token endpoint.
- token
Post List<String>Args Values - Extra post argument values passed to the token endpoint.
- Boolean
- Destroy any active session for the unauthorized requests.
- String
- The error message for the unauthorized requests (when not using the redirection).
- List<String>
- Where to redirect the client on unauthorized requests.
- unexpected
Redirect List<String>Uris - Where to redirect the client when unexpected errors happen with the requests.
- upstream
Access StringToken Header - The upstream access token header.
- upstream
Access StringToken Jwk Header - The upstream access token JWK header.
- upstream
Headers List<String>Claims - The upstream header claims. Only top level claims are supported.
- upstream
Headers List<String>Names - The upstream header names for the claim values.
- upstream
Id StringToken Header - The upstream id token header.
- upstream
Id StringToken Jwk Header - The upstream id token JWK header.
- upstream
Introspection StringHeader - The upstream introspection header.
- upstream
Introspection StringJwt Header - The upstream introspection JWT header.
- upstream
Refresh StringToken Header - The upstream refresh token header.
- upstream
Session StringId Header - The upstream session id header.
- upstream
User StringInfo Header - The upstream user info header.
- upstream
User StringInfo Jwt Header - The upstream user info JWT header (in case the user info returns a JWT response).
- userinfo
Accept String - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - userinfo
Endpoint String - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - userinfo
Headers List<String>Clients - Extra headers passed from the client to the user info endpoint.
- userinfo
Headers List<String>Names - Extra header names passed to the user info endpoint.
- userinfo
Headers List<String>Values - Extra header values passed to the user info endpoint.
- userinfo
Query List<String>Args Clients - Extra query arguments passed from the client to the user info endpoint.
- userinfo
Query List<String>Args Names - Extra query argument names passed to the user info endpoint.
- userinfo
Query List<String>Args Values - Extra query argument values passed to the user info endpoint.
- using
Pseudo BooleanIssuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - verify
Claims Boolean - Verify tokens for standard claims.
- verify
Nonce Boolean - Verify nonce on authorization code flow.
- verify
Parameters Boolean - Verify plugin configuration against discovery.
- verify
Signature Boolean - Verify signature of tokens.
- anonymous string
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - audience
Claims string[] - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- audience
Requireds string[] - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - audiences string[]
- The audience passed to the authorization endpoint.
- auth
Methods string[] - Types of credentials/grants to enable.
- authenticated
Groups string[]Claims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- string
- The authorization cookie Domain flag.
- boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The authorization cookie name.
- string
- The authorization cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- string
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - string[]
- Extra query arguments passed from the client to the authorization endpoint.
- string[]
- Extra query argument names passed to the authorization endpoint.
- string[]
- Extra query argument values passed to the authorization endpoint.
- number
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- string
- The name of the cookie in which the bearer token is passed.
- bearer
Token string[]Param Types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - by
Username booleanIgnore Case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - cache
Introspection boolean - Cache the introspection endpoint requests.
- cache
Token booleanExchange - Cache the token exchange endpoint requests.
- cache
Tokens boolean - Cache the token endpoint requests.
- cache
Tokens stringSalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- cache
Ttl number - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- cache
Ttl numberMax - The maximum cache ttl in seconds (enforced).
- cache
Ttl numberMin - The minimum cache ttl in seconds (enforced).
- cache
Ttl numberNeg - The negative cache ttl in seconds.
- cache
Ttl numberResurrect - The resurrection ttl in seconds.
- cache
User booleanInfo - Cache the user info requests.
- claims
Forbiddens string[] - If given, these claims are forbidden in the token payload.
- client
Algs string[] - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- client
Arg string - The client to use for this request (the selection is made with a request parameter with the same name).
- client
Auths string[] - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- client
Credentials string[]Param Types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - client
Ids string[] - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- client
Jwks GetGateway Plugin Openid Connect Config Client Jwk[] - The JWK used for the private_key_jwt authentication.
- client
Secrets string[] - The client secret.
- cluster
Cache GetRedis Gateway Plugin Openid Connect Config Cluster Cache Redis - cluster
Cache stringStrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- consumer
Bies string[] - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - consumer
Claims string[] - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- consumer
Optional boolean - Do not terminate the request if consumer mapping fails.
- credential
Claims string[] - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- disable
Sessions string[] - Disable issuing the session cookie with the specified grants.
- discovery
Headers string[]Names - Extra header names passed to the discovery endpoint.
- discovery
Headers string[]Values - Extra header values passed to the discovery endpoint.
- display
Errors boolean - Display errors on failure responses.
- domains string[]
- The allowed values for the
hd
claim. - downstream
Access stringToken Header - The downstream access token header.
- downstream
Access stringToken Jwk Header - The downstream access token JWK header.
- downstream
Headers string[]Claims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- downstream
Headers string[]Names - The downstream header names for the claim values.
- downstream
Id stringToken Header - The downstream id token header.
- downstream
Id stringToken Jwk Header - The downstream id token JWK header.
- downstream
Introspection stringHeader - The downstream introspection header.
- downstream
Introspection stringJwt Header - The downstream introspection JWT header.
- downstream
Refresh stringToken Header - The downstream refresh token header.
- downstream
Session stringId Header - The downstream session id header.
- downstream
User stringInfo Header - The downstream user info header.
- downstream
User stringInfo Jwt Header - The downstream user info JWT header (in case the user info returns a JWT response).
- dpop
Proof numberLifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- dpop
Use booleanNonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- enable
Hs booleanSignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- end
Session stringEndpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - expose
Error booleanCode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - extra
Jwks string[]Uris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- forbidden
Destroy booleanSession - Destroy any active session for the forbidden requests.
- forbidden
Error stringMessage - The error message for the forbidden requests (when not using the redirection).
- forbidden
Redirect string[]Uris - Where to redirect the client on forbidden requests.
- groups
Claims string[] - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- groups
Requireds string[] - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - hide
Credentials boolean - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- http
Proxy string - The HTTP proxy.
- string
- The HTTP proxy authorization.
- http
Version number - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - https
Proxy string - The HTTPS proxy.
- string
- The HTTPS proxy authorization.
- id
Token stringParam Name - The name of the parameter used to pass the id token.
- id
Token string[]Param Types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - ignore
Signatures string[] - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - introspect
Jwt booleanTokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- introspection
Accept string - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - introspection
Check booleanActive - Check that the introspection response has an
active
claim with a value oftrue
. - introspection
Endpoint string - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - introspection
Endpoint stringAuth Method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - introspection
Headers string[]Clients - Extra headers passed from the client to the introspection endpoint.
- introspection
Headers string[]Names - Extra header names passed to the introspection endpoint.
- introspection
Headers string[]Values - Extra header values passed to the introspection endpoint.
- introspection
Hint string - Introspection hint parameter value passed to the introspection endpoint.
- introspection
Post string[]Args Client Headers - Extra post arguments passed from the client headers to the introspection endpoint.
- introspection
Post string[]Args Clients - Extra post arguments passed from the client to the introspection endpoint.
- introspection
Post string[]Args Names - Extra post argument names passed to the introspection endpoint.
- introspection
Post string[]Args Values - Extra post argument values passed to the introspection endpoint.
- introspection
Token stringParam Name - Designate token's parameter name for introspection.
- issuer string
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - issuers
Alloweds string[] - The issuers allowed to be present in the tokens (
iss
claim). - jwt
Session stringClaim - The claim to match against the JWT session cookie.
- string
- The name of the JWT session cookie.
- keepalive boolean
- Use keepalive with the HTTP client.
- leeway number
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - login
Action string - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - login
Methods string[] - Enable login functionality with specified grants.
- login
Redirect stringMode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - login
Redirect string[]Uris - Where to redirect the client when
login_action
is set toredirect
. - login
Tokens string[] - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - logout
Methods string[] - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - logout
Post stringArg - The request body argument that activates the logout.
- logout
Query stringArg - The request query argument that activates the logout.
- logout
Redirect string[]Uris - Where to redirect the client after the logout.
- logout
Revoke boolean Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- logout
Revoke booleanAccess Token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Revoke booleanRefresh Token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Uri stringSuffix - The request URI suffix that activates the logout.
- max
Age number - The maximum age (in seconds) compared to the
auth_time
claim. - mtls
Introspection stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Revocation stringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Token stringEndpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - no
Proxy string - Do not use proxy with these hosts.
- password
Param string[]Types - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - preserve
Query booleanArgs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- proof
Of booleanPossession Auth Methods Validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- proof
Of stringPossession Dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- proof
Of stringPossession Mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- string
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - string
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - redirect
Uris string[] - The redirect URI passed to the authorization and token endpoints.
- redis
Get
Gateway Plugin Openid Connect Config Redis - rediscovery
Lifetime number - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- refresh
Token stringParam Name - The name of the parameter used to pass the refresh token.
- refresh
Token string[]Param Types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - refresh
Tokens boolean - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - require
Proof booleanKey For Code Exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - boolean
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - require
Signed booleanRequest Object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - resolve
Distributed booleanClaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - response
Mode string - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - response
Types string[] - The response type passed to the authorization endpoint.
- reverify boolean
- Specifies whether to always verify tokens stored in the session.
- revocation
Endpoint string - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - revocation
Endpoint stringAuth Method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - revocation
Token stringParam Name - Designate token's parameter name for revocation.
- roles
Claims string[] - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- roles
Requireds string[] - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - run
On booleanPreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - scopes string[]
- The scopes passed to the authorization and token endpoints.
- scopes
Claims string[] - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- scopes
Requireds string[] - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - search
User booleanInfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- session
Absolute numberTimeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- session
Audience string - The session audience, which is the intended target application. For example
"my-application"
. - string
- The session cookie Domain flag.
- boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - string
- The session cookie name.
- string
- The session cookie Path flag.
- string
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- session
Enforce booleanSame Subject - When set to
true
, audiences are forced to share the same subject. - session
Hash booleanStorage Key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - session
Hash booleanSubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - session
Idling numberTimeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- session
Memcached stringHost - The memcached host.
- session
Memcached numberPort - The memcached port.
- session
Memcached stringPrefix - The memcached session key prefix.
- session
Memcached stringSocket - The memcached unix socket path.
- session
Remember boolean - Enables or disables persistent sessions.
- session
Remember numberAbsolute Timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- string
- Persistent session cookie name. Use with the
remember
configuration parameter. - session
Remember numberRolling Timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- session
Request string[]Headers - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - session
Response string[]Headers - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - session
Rolling numberTimeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- session
Secret string - The session secret.
- session
Storage string - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - session
Store booleanMetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- ssl
Verify boolean - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - timeout number
- Network IO timeout in milliseconds.
- tls
Client stringAuth Cert Id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- tls
Client booleanAuth Ssl Verify - Verify identity provider server certificate during mTLS client authentication.
- token
Cache booleanKey Include Scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- token
Endpoint string - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - token
Endpoint stringAuth Method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - token
Exchange stringEndpoint - The token exchange endpoint.
- token
Headers string[]Clients - Extra headers passed from the client to the token endpoint.
- token
Headers string[]Grants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - token
Headers string[]Names - Extra header names passed to the token endpoint.
- token
Headers stringPrefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- token
Headers string[]Replays - The names of token endpoint response headers to forward to the downstream client.
- token
Headers string[]Values - Extra header values passed to the token endpoint.
- token
Post string[]Args Clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - token
Post string[]Args Names - Extra post argument names passed to the token endpoint.
- token
Post string[]Args Values - Extra post argument values passed to the token endpoint.
- boolean
- Destroy any active session for the unauthorized requests.
- string
- The error message for the unauthorized requests (when not using the redirection).
- string[]
- Where to redirect the client on unauthorized requests.
- unexpected
Redirect string[]Uris - Where to redirect the client when unexpected errors happen with the requests.
- upstream
Access stringToken Header - The upstream access token header.
- upstream
Access stringToken Jwk Header - The upstream access token JWK header.
- upstream
Headers string[]Claims - The upstream header claims. Only top level claims are supported.
- upstream
Headers string[]Names - The upstream header names for the claim values.
- upstream
Id stringToken Header - The upstream id token header.
- upstream
Id stringToken Jwk Header - The upstream id token JWK header.
- upstream
Introspection stringHeader - The upstream introspection header.
- upstream
Introspection stringJwt Header - The upstream introspection JWT header.
- upstream
Refresh stringToken Header - The upstream refresh token header.
- upstream
Session stringId Header - The upstream session id header.
- upstream
User stringInfo Header - The upstream user info header.
- upstream
User stringInfo Jwt Header - The upstream user info JWT header (in case the user info returns a JWT response).
- userinfo
Accept string - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - userinfo
Endpoint string - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - userinfo
Headers string[]Clients - Extra headers passed from the client to the user info endpoint.
- userinfo
Headers string[]Names - Extra header names passed to the user info endpoint.
- userinfo
Headers string[]Values - Extra header values passed to the user info endpoint.
- userinfo
Query string[]Args Clients - Extra query arguments passed from the client to the user info endpoint.
- userinfo
Query string[]Args Names - Extra query argument names passed to the user info endpoint.
- userinfo
Query string[]Args Values - Extra query argument values passed to the user info endpoint.
- using
Pseudo booleanIssuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - verify
Claims boolean - Verify tokens for standard claims.
- verify
Nonce boolean - Verify nonce on authorization code flow.
- verify
Parameters boolean - Verify plugin configuration against discovery.
- verify
Signature boolean - Verify signature of tokens.
- anonymous str
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - audience_
claims Sequence[str] - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- audience_
requireds Sequence[str] - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - audiences Sequence[str]
- The audience passed to the authorization endpoint.
- auth_
methods Sequence[str] - Types of credentials/grants to enable.
- authenticated_
groups_ Sequence[str]claims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- str
- The authorization cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - str
- The authorization cookie name.
- str
- The authorization cookie Path flag.
- str
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- str
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - Sequence[str]
- Extra query arguments passed from the client to the authorization endpoint.
- Sequence[str]
- Extra query argument names passed to the authorization endpoint.
- Sequence[str]
- Extra query argument values passed to the authorization endpoint.
- float
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- str
- The name of the cookie in which the bearer token is passed.
- bearer_
token_ Sequence[str]param_ types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - by_
username_ boolignore_ case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - cache_
introspection bool - Cache the introspection endpoint requests.
- cache_
token_ boolexchange - Cache the token exchange endpoint requests.
- cache_
tokens bool - Cache the token endpoint requests.
- cache_
tokens_ strsalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- cache_
ttl float - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- cache_
ttl_ floatmax - The maximum cache ttl in seconds (enforced).
- cache_
ttl_ floatmin - The minimum cache ttl in seconds (enforced).
- cache_
ttl_ floatneg - The negative cache ttl in seconds.
- cache_
ttl_ floatresurrect - The resurrection ttl in seconds.
- cache_
user_ boolinfo - Cache the user info requests.
- claims_
forbiddens Sequence[str] - If given, these claims are forbidden in the token payload.
- client_
algs Sequence[str] - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- client_
arg str - The client to use for this request (the selection is made with a request parameter with the same name).
- client_
auths Sequence[str] - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- client_
credentials_ Sequence[str]param_ types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - client_
ids Sequence[str] - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- client_
jwks Sequence[GetGateway Plugin Openid Connect Config Client Jwk] - The JWK used for the private_key_jwt authentication.
- client_
secrets Sequence[str] - The client secret.
- cluster_
cache_ Getredis Gateway Plugin Openid Connect Config Cluster Cache Redis - cluster_
cache_ strstrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- consumer_
bies Sequence[str] - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - consumer_
claims Sequence[str] - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- consumer_
optional bool - Do not terminate the request if consumer mapping fails.
- credential_
claims Sequence[str] - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- disable_
sessions Sequence[str] - Disable issuing the session cookie with the specified grants.
- discovery_
headers_ Sequence[str]names - Extra header names passed to the discovery endpoint.
- discovery_
headers_ Sequence[str]values - Extra header values passed to the discovery endpoint.
- display_
errors bool - Display errors on failure responses.
- domains Sequence[str]
- The allowed values for the
hd
claim. - downstream_
access_ strtoken_ header - The downstream access token header.
- downstream_
access_ strtoken_ jwk_ header - The downstream access token JWK header.
- downstream_
headers_ Sequence[str]claims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- downstream_
headers_ Sequence[str]names - The downstream header names for the claim values.
- downstream_
id_ strtoken_ header - The downstream id token header.
- downstream_
id_ strtoken_ jwk_ header - The downstream id token JWK header.
- downstream_
introspection_ strheader - The downstream introspection header.
- downstream_
introspection_ strjwt_ header - The downstream introspection JWT header.
- downstream_
refresh_ strtoken_ header - The downstream refresh token header.
- downstream_
session_ strid_ header - The downstream session id header.
- downstream_
user_ strinfo_ header - The downstream user info header.
- downstream_
user_ strinfo_ jwt_ header - The downstream user info JWT header (in case the user info returns a JWT response).
- dpop_
proof_ floatlifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- dpop_
use_ boolnonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- enable_
hs_ boolsignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- end_
session_ strendpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - expose_
error_ boolcode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - extra_
jwks_ Sequence[str]uris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- forbidden_
destroy_ boolsession - Destroy any active session for the forbidden requests.
- forbidden_
error_ strmessage - The error message for the forbidden requests (when not using the redirection).
- forbidden_
redirect_ Sequence[str]uris - Where to redirect the client on forbidden requests.
- groups_
claims Sequence[str] - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- groups_
requireds Sequence[str] - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - hide_
credentials bool - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- http_
proxy str - The HTTP proxy.
- str
- The HTTP proxy authorization.
- http_
version float - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - https_
proxy str - The HTTPS proxy.
- str
- The HTTPS proxy authorization.
- id_
token_ strparam_ name - The name of the parameter used to pass the id token.
- id_
token_ Sequence[str]param_ types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - ignore_
signatures Sequence[str] - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - introspect_
jwt_ booltokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- introspection_
accept str - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - introspection_
check_ boolactive - Check that the introspection response has an
active
claim with a value oftrue
. - introspection_
endpoint str - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - introspection_
endpoint_ strauth_ method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - introspection_
headers_ Sequence[str]clients - Extra headers passed from the client to the introspection endpoint.
- introspection_
headers_ Sequence[str]names - Extra header names passed to the introspection endpoint.
- introspection_
headers_ Sequence[str]values - Extra header values passed to the introspection endpoint.
- introspection_
hint str - Introspection hint parameter value passed to the introspection endpoint.
- introspection_
post_ Sequence[str]args_ client_ headers - Extra post arguments passed from the client headers to the introspection endpoint.
- introspection_
post_ Sequence[str]args_ clients - Extra post arguments passed from the client to the introspection endpoint.
- introspection_
post_ Sequence[str]args_ names - Extra post argument names passed to the introspection endpoint.
- introspection_
post_ Sequence[str]args_ values - Extra post argument values passed to the introspection endpoint.
- introspection_
token_ strparam_ name - Designate token's parameter name for introspection.
- issuer str
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - issuers_
alloweds Sequence[str] - The issuers allowed to be present in the tokens (
iss
claim). - jwt_
session_ strclaim - The claim to match against the JWT session cookie.
- str
- The name of the JWT session cookie.
- keepalive bool
- Use keepalive with the HTTP client.
- leeway float
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - login_
action str - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - login_
methods Sequence[str] - Enable login functionality with specified grants.
- login_
redirect_ strmode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - login_
redirect_ Sequence[str]uris - Where to redirect the client when
login_action
is set toredirect
. - login_
tokens Sequence[str] - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - logout_
methods Sequence[str] - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - logout_
post_ strarg - The request body argument that activates the logout.
- logout_
query_ strarg - The request query argument that activates the logout.
- logout_
redirect_ Sequence[str]uris - Where to redirect the client after the logout.
- logout_
revoke bool Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- logout_
revoke_ boolaccess_ token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout_
revoke_ boolrefresh_ token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout_
uri_ strsuffix - The request URI suffix that activates the logout.
- max_
age float - The maximum age (in seconds) compared to the
auth_time
claim. - mtls_
introspection_ strendpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls_
revocation_ strendpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls_
token_ strendpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - no_
proxy str - Do not use proxy with these hosts.
- password_
param_ Sequence[str]types - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - preserve_
query_ boolargs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- proof_
of_ boolpossession_ auth_ methods_ validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- proof_
of_ strpossession_ dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- proof_
of_ strpossession_ mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- str
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - str
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - redirect_
uris Sequence[str] - The redirect URI passed to the authorization and token endpoints.
- redis
Get
Gateway Plugin Openid Connect Config Redis - rediscovery_
lifetime float - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- refresh_
token_ strparam_ name - The name of the parameter used to pass the refresh token.
- refresh_
token_ Sequence[str]param_ types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - refresh_
tokens bool - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - require_
proof_ boolkey_ for_ code_ exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - bool
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - require_
signed_ boolrequest_ object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - resolve_
distributed_ boolclaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - response_
mode str - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - response_
types Sequence[str] - The response type passed to the authorization endpoint.
- reverify bool
- Specifies whether to always verify tokens stored in the session.
- revocation_
endpoint str - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - revocation_
endpoint_ strauth_ method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - revocation_
token_ strparam_ name - Designate token's parameter name for revocation.
- roles_
claims Sequence[str] - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- roles_
requireds Sequence[str] - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - run_
on_ boolpreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - scopes Sequence[str]
- The scopes passed to the authorization and token endpoints.
- scopes_
claims Sequence[str] - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- scopes_
requireds Sequence[str] - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - search_
user_ boolinfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- session_
absolute_ floattimeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- session_
audience str - The session audience, which is the intended target application. For example
"my-application"
. - str
- The session cookie Domain flag.
- bool
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - str
- The session cookie name.
- str
- The session cookie Path flag.
- str
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- bool
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- session_
enforce_ boolsame_ subject - When set to
true
, audiences are forced to share the same subject. - session_
hash_ boolstorage_ key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - session_
hash_ boolsubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - session_
idling_ floattimeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- session_
memcached_ strhost - The memcached host.
- session_
memcached_ floatport - The memcached port.
- session_
memcached_ strprefix - The memcached session key prefix.
- session_
memcached_ strsocket - The memcached unix socket path.
- session_
remember bool - Enables or disables persistent sessions.
- session_
remember_ floatabsolute_ timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- str
- Persistent session cookie name. Use with the
remember
configuration parameter. - session_
remember_ floatrolling_ timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- session_
request_ Sequence[str]headers - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - session_
response_ Sequence[str]headers - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - session_
rolling_ floattimeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- session_
secret str - The session secret.
- session_
storage str - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - session_
store_ boolmetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- ssl_
verify bool - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - timeout float
- Network IO timeout in milliseconds.
- tls_
client_ strauth_ cert_ id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- tls_
client_ boolauth_ ssl_ verify - Verify identity provider server certificate during mTLS client authentication.
- token_
cache_ boolkey_ include_ scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- token_
endpoint str - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - token_
endpoint_ strauth_ method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - token_
exchange_ strendpoint - The token exchange endpoint.
- token_
headers_ Sequence[str]clients - Extra headers passed from the client to the token endpoint.
- token_
headers_ Sequence[str]grants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - token_
headers_ Sequence[str]names - Extra header names passed to the token endpoint.
- token_
headers_ strprefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- token_
headers_ Sequence[str]replays - The names of token endpoint response headers to forward to the downstream client.
- token_
headers_ Sequence[str]values - Extra header values passed to the token endpoint.
- token_
post_ Sequence[str]args_ clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - token_
post_ Sequence[str]args_ names - Extra post argument names passed to the token endpoint.
- token_
post_ Sequence[str]args_ values - Extra post argument values passed to the token endpoint.
- bool
- Destroy any active session for the unauthorized requests.
- str
- The error message for the unauthorized requests (when not using the redirection).
- Sequence[str]
- Where to redirect the client on unauthorized requests.
- unexpected_
redirect_ Sequence[str]uris - Where to redirect the client when unexpected errors happen with the requests.
- upstream_
access_ strtoken_ header - The upstream access token header.
- upstream_
access_ strtoken_ jwk_ header - The upstream access token JWK header.
- upstream_
headers_ Sequence[str]claims - The upstream header claims. Only top level claims are supported.
- upstream_
headers_ Sequence[str]names - The upstream header names for the claim values.
- upstream_
id_ strtoken_ header - The upstream id token header.
- upstream_
id_ strtoken_ jwk_ header - The upstream id token JWK header.
- upstream_
introspection_ strheader - The upstream introspection header.
- upstream_
introspection_ strjwt_ header - The upstream introspection JWT header.
- upstream_
refresh_ strtoken_ header - The upstream refresh token header.
- upstream_
session_ strid_ header - The upstream session id header.
- upstream_
user_ strinfo_ header - The upstream user info header.
- upstream_
user_ strinfo_ jwt_ header - The upstream user info JWT header (in case the user info returns a JWT response).
- userinfo_
accept str - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - userinfo_
endpoint str - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - userinfo_
headers_ Sequence[str]clients - Extra headers passed from the client to the user info endpoint.
- userinfo_
headers_ Sequence[str]names - Extra header names passed to the user info endpoint.
- userinfo_
headers_ Sequence[str]values - Extra header values passed to the user info endpoint.
- userinfo_
query_ Sequence[str]args_ clients - Extra query arguments passed from the client to the user info endpoint.
- userinfo_
query_ Sequence[str]args_ names - Extra query argument names passed to the user info endpoint.
- userinfo_
query_ Sequence[str]args_ values - Extra query argument values passed to the user info endpoint.
- using_
pseudo_ boolissuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - verify_
claims bool - Verify tokens for standard claims.
- verify_
nonce bool - Verify nonce on authorization code flow.
- verify_
parameters bool - Verify plugin configuration against discovery.
- verify_
signature bool - Verify signature of tokens.
- anonymous String
- An optional string (consumer UUID or username) value that functions as an “anonymous” consumer if authentication fails. If empty (default null), requests that fail authentication will return a
4xx
HTTP status code. This value must refer to the consumerid
orusername
attribute, and not itscustom_id
. - audience
Claims List<String> - The claim that contains the audience. If multiple values are set, it means the claim is inside a nested object of the token payload.
- audience
Requireds List<String> - The audiences (
audience_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - audiences List<String>
- The audience passed to the authorization endpoint.
- auth
Methods List<String> - Types of credentials/grants to enable.
- authenticated
Groups List<String>Claims - The claim that contains authenticated groups. This setting can be used together with ACL plugin, but it also enables IdP managed groups with other applications and integrations. If multiple values are set, it means the claim is inside a nested object of the token payload.
- String
- The authorization cookie Domain flag.
- Boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - String
- The authorization cookie name.
- String
- The authorization cookie Path flag.
- String
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- Boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- String
- The authorization endpoint. If set it overrides the value in
authorization_endpoint
returned by the discovery endpoint. - List<String>
- Extra query arguments passed from the client to the authorization endpoint.
- List<String>
- Extra query argument names passed to the authorization endpoint.
- List<String>
- Extra query argument values passed to the authorization endpoint.
- Number
- Specifies how long the session used for the authorization code flow can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- String
- The name of the cookie in which the bearer token is passed.
- bearer
Token List<String>Param Types - Where to look for the bearer token: -
header
: search theAuthorization
,access-token
, andx-access-token
HTTP headers -query
: search the URL's query string -body
: search the HTTP request body -cookie
: search the HTTP request cookies specified withconfig.bearer_token_cookie_name
. - by
Username BooleanIgnore Case - If
consumer_by
is set tousername
, specify whetherusername
can match consumers case-insensitively. - cache
Introspection Boolean - Cache the introspection endpoint requests.
- cache
Token BooleanExchange - Cache the token exchange endpoint requests.
- cache
Tokens Boolean - Cache the token endpoint requests.
- cache
Tokens StringSalt - Salt used for generating the cache key that is used for caching the token endpoint requests.
- cache
Ttl Number - The default cache ttl in seconds that is used in case the cached object does not specify the expiry.
- cache
Ttl NumberMax - The maximum cache ttl in seconds (enforced).
- cache
Ttl NumberMin - The minimum cache ttl in seconds (enforced).
- cache
Ttl NumberNeg - The negative cache ttl in seconds.
- cache
Ttl NumberResurrect - The resurrection ttl in seconds.
- cache
User BooleanInfo - Cache the user info requests.
- claims
Forbiddens List<String> - If given, these claims are forbidden in the token payload.
- client
Algs List<String> - The algorithm to use for client_secret_jwt (only HS***) or private_key_jwt authentication.
- client
Arg String - The client to use for this request (the selection is made with a request parameter with the same name).
- client
Auths List<String> - The default OpenID Connect client authentication method is 'client_secret_basic' (using 'Authorization: Basic' header), 'client_secret_post' (credentials in body), 'client_secret_jwt' (signed client assertion in body), 'private_key_jwt' (private key-signed assertion), 'tls_client_auth' (client certificate), 'self_signed_tls_client_auth' (self-signed client certificate), and 'none' (no authentication).
- client
Credentials List<String>Param Types - Where to look for the client credentials: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search from the HTTP request body. - client
Ids List<String> - The client id(s) that the plugin uses when it calls authenticated endpoints on the identity provider.
- client
Jwks List<Property Map> - The JWK used for the private_key_jwt authentication.
- client
Secrets List<String> - The client secret.
- cluster
Cache Property MapRedis - cluster
Cache StringStrategy - The strategy to use for the cluster cache. If set, the plugin will share cache with nodes configured with the same strategy backend. Currentlly only introspection cache is shared.
- consumer
Bies List<String> - Consumer fields used for mapping: -
id
: try to find the matching Consumer byid
-username
: try to find the matching Consumer byusername
-custom_id
: try to find the matching Consumer bycustom_id
. - consumer
Claims List<String> - The claim used for consumer mapping. If multiple values are set, it means the claim is inside a nested object of the token payload.
- consumer
Optional Boolean - Do not terminate the request if consumer mapping fails.
- credential
Claims List<String> - The claim used to derive virtual credentials (e.g. to be consumed by the rate-limiting plugin), in case the consumer mapping is not used. If multiple values are set, it means the claim is inside a nested object of the token payload.
- disable
Sessions List<String> - Disable issuing the session cookie with the specified grants.
- discovery
Headers List<String>Names - Extra header names passed to the discovery endpoint.
- discovery
Headers List<String>Values - Extra header values passed to the discovery endpoint.
- display
Errors Boolean - Display errors on failure responses.
- domains List<String>
- The allowed values for the
hd
claim. - downstream
Access StringToken Header - The downstream access token header.
- downstream
Access StringToken Jwk Header - The downstream access token JWK header.
- downstream
Headers List<String>Claims - The downstream header claims. If multiple values are set, it means the claim is inside a nested object of the token payload.
- downstream
Headers List<String>Names - The downstream header names for the claim values.
- downstream
Id StringToken Header - The downstream id token header.
- downstream
Id StringToken Jwk Header - The downstream id token JWK header.
- downstream
Introspection StringHeader - The downstream introspection header.
- downstream
Introspection StringJwt Header - The downstream introspection JWT header.
- downstream
Refresh StringToken Header - The downstream refresh token header.
- downstream
Session StringId Header - The downstream session id header.
- downstream
User StringInfo Header - The downstream user info header.
- downstream
User StringInfo Jwt Header - The downstream user info JWT header (in case the user info returns a JWT response).
- dpop
Proof NumberLifetime - Specifies the lifetime in seconds of the DPoP proof. It determines how long the same proof can be used after creation. The creation time is determined by the nonce creation time if a nonce is used, and the iat claim otherwise.
- dpop
Use BooleanNonce - Specifies whether to challenge the client with a nonce value for DPoP proof. When enabled it will also be used to calculate the DPoP proof lifetime.
- enable
Hs BooleanSignatures - Enable shared secret, for example, HS256, signatures (when disabled they will not be accepted).
- end
Session StringEndpoint - The end session endpoint. If set it overrides the value in
end_session_endpoint
returned by the discovery endpoint. - expose
Error BooleanCode - Specifies whether to expose the error code header, as defined in RFC 6750. If an authorization request fails, this header is sent in the response. Set to
false
to disable. - extra
Jwks List<String>Uris - JWKS URIs whose public keys are trusted (in addition to the keys found with the discovery).
- forbidden
Destroy BooleanSession - Destroy any active session for the forbidden requests.
- forbidden
Error StringMessage - The error message for the forbidden requests (when not using the redirection).
- forbidden
Redirect List<String>Uris - Where to redirect the client on forbidden requests.
- groups
Claims List<String> - The claim that contains the groups. If multiple values are set, it means the claim is inside a nested object of the token payload.
- groups
Requireds List<String> - The groups (
groups_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - hide
Credentials Boolean - Remove the credentials used for authentication from the request. If multiple credentials are sent with the same request, the plugin will remove those that were used for successful authentication.
- http
Proxy String - The HTTP proxy.
- String
- The HTTP proxy authorization.
- http
Version Number - The HTTP version used for the requests by this plugin: -
1.1
: HTTP 1.1 (the default) -1.0
: HTTP 1.0. - https
Proxy String - The HTTPS proxy.
- String
- The HTTPS proxy authorization.
- id
Token StringParam Name - The name of the parameter used to pass the id token.
- id
Token List<String>Param Types - Where to look for the id token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - ignore
Signatures List<String> - Skip the token signature verification on certain grants: -
password
: OAuth password grant -client_credentials
: OAuth client credentials grant -authorization_code
: authorization code flow -refresh_token
: OAuth refresh token grant -session
: session cookie authentication -introspection
: OAuth introspection -userinfo
: OpenID Connect user info endpoint authentication. - introspect
Jwt BooleanTokens - Specifies whether to introspect the JWT access tokens (can be used to check for revocations).
- introspection
Accept String - The value of
Accept
header for introspection requests: -application/json
: introspection response as JSON -application/token-introspection+jwt
: introspection response as JWT (from the current IETF draft document) -application/jwt
: introspection response as JWT (from the obsolete IETF draft document). - introspection
Check BooleanActive - Check that the introspection response has an
active
claim with a value oftrue
. - introspection
Endpoint String - The introspection endpoint. If set it overrides the value in
introspection_endpoint
returned by the discovery endpoint. - introspection
Endpoint StringAuth Method - The introspection endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - introspection
Headers List<String>Clients - Extra headers passed from the client to the introspection endpoint.
- introspection
Headers List<String>Names - Extra header names passed to the introspection endpoint.
- introspection
Headers List<String>Values - Extra header values passed to the introspection endpoint.
- introspection
Hint String - Introspection hint parameter value passed to the introspection endpoint.
- introspection
Post List<String>Args Client Headers - Extra post arguments passed from the client headers to the introspection endpoint.
- introspection
Post List<String>Args Clients - Extra post arguments passed from the client to the introspection endpoint.
- introspection
Post List<String>Args Names - Extra post argument names passed to the introspection endpoint.
- introspection
Post List<String>Args Values - Extra post argument values passed to the introspection endpoint.
- introspection
Token StringParam Name - Designate token's parameter name for introspection.
- issuer String
- The discovery endpoint (or the issuer identifier). When there is no discovery endpoint, please also configure
config.using_pseudo_issuer=true
. - issuers
Alloweds List<String> - The issuers allowed to be present in the tokens (
iss
claim). - jwt
Session StringClaim - The claim to match against the JWT session cookie.
- String
- The name of the JWT session cookie.
- keepalive Boolean
- Use keepalive with the HTTP client.
- leeway Number
- Defines leeway time (in seconds) for
auth_time
,exp
,iat
, andnbf
claims - login
Action String - What to do after successful login: -
upstream
: proxy request to upstream service -response
: terminate request with a response -redirect
: redirect to a different location. - login
Methods List<String> - Enable login functionality with specified grants.
- login
Redirect StringMode - Where to place
login_tokens
when usingredirect
login_action
: -query
: place tokens in query string -fragment
: place tokens in url fragment (not readable by servers). - login
Redirect List<String>Uris - Where to redirect the client when
login_action
is set toredirect
. - login
Tokens List<String> - What tokens to include in
response
body orredirect
query string or fragment: -id_token
: include id token -access_token
: include access token -refresh_token
: include refresh token -tokens
: include the full token endpoint response -introspection
: include introspection response. - logout
Methods List<String> - The request methods that can activate the logout: -
POST
: HTTP POST method -GET
: HTTP GET method -DELETE
: HTTP DELETE method. - logout
Post StringArg - The request body argument that activates the logout.
- logout
Query StringArg - The request query argument that activates the logout.
- logout
Redirect List<String>Uris - Where to redirect the client after the logout.
- logout
Revoke Boolean Revoke tokens as part of the logout.
For more granular token revocation, you can also adjust the
logout_revoke_access_token
andlogout_revoke_refresh_token
parameters.- logout
Revoke BooleanAccess Token - Revoke the access token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Revoke BooleanRefresh Token - Revoke the refresh token as part of the logout. Requires
logout_revoke
to be set totrue
. - logout
Uri StringSuffix - The request URI suffix that activates the logout.
- max
Age Number - The maximum age (in seconds) compared to the
auth_time
claim. - mtls
Introspection StringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Revocation StringEndpoint - Alias for the introspection endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - mtls
Token StringEndpoint - Alias for the token endpoint to be used for mTLS client authentication. If set it overrides the value in
mtls_endpoint_aliases
returned by the discovery endpoint. - no
Proxy String - Do not use proxy with these hosts.
- password
Param List<String>Types - Where to look for the username and password: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - preserve
Query BooleanArgs - With this parameter, you can preserve request query arguments even when doing authorization code flow.
- proof
Of BooleanPossession Auth Methods Validation - If set to true, only the auth_methods that are compatible with Proof of Possession (PoP) can be configured when PoP is enabled. If set to false, all auth_methods will be configurable and PoP checks will be silently skipped for those auth_methods that are not compatible with PoP.
- proof
Of StringPossession Dpop - Enable Demonstrating Proof-of-Possession (DPoP). If set to strict, all request are verified despite the presence of the DPoP key claim (cnf.jkt). If set to optional, only tokens bound with DPoP's key are verified with the proof.
- proof
Of StringPossession Mtls - Enable mtls proof of possession. If set to strict, all tokens (from supported auth_methods: bearer, introspection, and session granted with bearer or introspection) are verified, if set to optional, only tokens that contain the certificate hash claim are verified. If the verification fails, the request will be rejected with 401.
- String
- The pushed authorization endpoint. If set it overrides the value in
pushed_authorization_request_endpoint
returned by the discovery endpoint. - String
- The pushed authorization request endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - redirect
Uris List<String> - The redirect URI passed to the authorization and token endpoints.
- redis Property Map
- rediscovery
Lifetime Number - Specifies how long (in seconds) the plugin waits between discovery attempts. Discovery is still triggered on an as-needed basis.
- refresh
Token StringParam Name - The name of the parameter used to pass the refresh token.
- refresh
Token List<String>Param Types - Where to look for the refresh token: -
header
: search the HTTP headers -query
: search the URL's query string -body
: search the HTTP request body. - refresh
Tokens Boolean - Specifies whether the plugin should try to refresh (soon to be) expired access tokens if the plugin has a
refresh_token
available. - require
Proof BooleanKey For Code Exchange - Forcibly enable or disable the proof key for code exchange. When not set the value is determined through the discovery using the value of
code_challenge_methods_supported
, and enabled automatically (in case thecode_challenge_methods_supported
is missing, the PKCE will not be enabled). - Boolean
- Forcibly enable or disable the pushed authorization requests. When not set the value is determined through the discovery using the value of
require_pushed_authorization_requests
(which defaults tofalse
). - require
Signed BooleanRequest Object - Forcibly enable or disable the usage of signed request object on authorization or pushed authorization endpoint. When not set the value is determined through the discovery using the value of
require_signed_request_object
, and enabled automatically (in case therequire_signed_request_object
is missing, the feature will not be enabled). - resolve
Distributed BooleanClaims - Distributed claims are represented by the
_claim_names
and_claim_sources
members of the JSON object containing the claims. If this parameter is set totrue
, the plugin explicitly resolves these distributed claims. - response
Mode String - Response mode passed to the authorization endpoint: -
query
: for parameters in query string -form_post
: for parameters in request body -fragment
: for parameters in uri fragment (rarely useful as the plugin itself cannot read it) -query.jwt
,form_post.jwt
,fragment.jwt
: similar toquery
,form_post
andfragment
but the parameters are encoded in a JWT -jwt
: shortcut that indicates the default encoding for the requested response type. - response
Types List<String> - The response type passed to the authorization endpoint.
- reverify Boolean
- Specifies whether to always verify tokens stored in the session.
- revocation
Endpoint String - The revocation endpoint. If set it overrides the value in
revocation_endpoint
returned by the discovery endpoint. - revocation
Endpoint StringAuth Method - The revocation endpoint authentication method: :
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - revocation
Token StringParam Name - Designate token's parameter name for revocation.
- roles
Claims List<String> - The claim that contains the roles. If multiple values are set, it means the claim is inside a nested object of the token payload.
- roles
Requireds List<String> - The roles (
roles_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - run
On BooleanPreflight - Specifies whether to run this plugin on pre-flight (
OPTIONS
) requests. - scopes List<String>
- The scopes passed to the authorization and token endpoints.
- scopes
Claims List<String> - The claim that contains the scopes. If multiple values are set, it means the claim is inside a nested object of the token payload.
- scopes
Requireds List<String> - The scopes (
scopes_claim
claim) required to be present in the access token (or introspection results) for successful authorization. This config parameter works in both AND / OR cases. - search
User BooleanInfo - Specify whether to use the user info endpoint to get additional claims for consumer mapping, credential mapping, authenticated groups, and upstream and downstream headers.
- session
Absolute NumberTimeout - Limits how long the session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- session
Audience String - The session audience, which is the intended target application. For example
"my-application"
. - String
- The session cookie Domain flag.
- Boolean
- Forbids JavaScript from accessing the cookie, for example, through the
Document.cookie
property. - String
- The session cookie name.
- String
- The session cookie Path flag.
- String
- Controls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
- Boolean
- Cookie is only sent to the server when a request is made with the https: scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
- session
Enforce BooleanSame Subject - When set to
true
, audiences are forced to share the same subject. - session
Hash BooleanStorage Key - When set to
true
, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie. - session
Hash BooleanSubject - When set to
true
, the value of subject is hashed before being stored. Only applies whensession_store_metadata
is enabled. - session
Idling NumberTimeout - Specifies how long the session can be inactive until it is considered invalid in seconds. 0 disables the checks and touching.
- session
Memcached StringHost - The memcached host.
- session
Memcached NumberPort - The memcached port.
- session
Memcached StringPrefix - The memcached session key prefix.
- session
Memcached StringSocket - The memcached unix socket path.
- session
Remember Boolean - Enables or disables persistent sessions.
- session
Remember NumberAbsolute Timeout - Limits how long the persistent session can be renewed in seconds, until re-authentication is required. 0 disables the checks.
- String
- Persistent session cookie name. Use with the
remember
configuration parameter. - session
Remember NumberRolling Timeout - Specifies how long the persistent session is considered valid in seconds. 0 disables the checks and rolling.
- session
Request List<String>Headers - Set of headers to send to upstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout request headers. - session
Response List<String>Headers - Set of headers to send to downstream, use id, audience, subject, timeout, idling-timeout, rolling-timeout, absolute-timeout. E.g.
[ "id", "timeout" ]
will set Session-Id and Session-Timeout response headers. - session
Rolling NumberTimeout - Specifies how long the session can be used in seconds until it needs to be renewed. 0 disables the checks and rolling.
- session
Secret String - The session secret.
- session
Storage String - The session storage for session data: -
cookie
: stores session data with the session cookie (the session cannot be invalidated or revoked without changing session secret, but is stateless, and doesn't require a database) -memcache
: stores session data in memcached -redis
: stores session data in Redis. - session
Store BooleanMetadata - Configures whether or not session metadata should be stored. This metadata includes information about the active sessions for a specific audience belonging to a specific subject.
- ssl
Verify Boolean - Verify identity provider server certificate. If set to
true
, the plugin uses the CA certificate set in thekong.conf
config parameterlua_ssl_trusted_certificate
. - timeout Number
- Network IO timeout in milliseconds.
- tls
Client StringAuth Cert Id - ID of the Certificate entity representing the client certificate to use for mTLS client authentication for connections between Kong and the Auth Server.
- tls
Client BooleanAuth Ssl Verify - Verify identity provider server certificate during mTLS client authentication.
- token
Cache BooleanKey Include Scope - Include the scope in the token cache key, so token with different scopes are considered diffrent tokens.
- token
Endpoint String - The token endpoint. If set it overrides the value in
token_endpoint
returned by the discovery endpoint. - token
Endpoint StringAuth Method - The token endpoint authentication method:
client_secret_basic
,client_secret_post
,client_secret_jwt
,private_key_jwt
,tls_client_auth
,self_signed_tls_client_auth
, ornone
: do not authenticate - token
Exchange StringEndpoint - The token exchange endpoint.
- token
Headers List<String>Clients - Extra headers passed from the client to the token endpoint.
- token
Headers List<String>Grants - Enable the sending of the token endpoint response headers only with certain grants: -
password
: with OAuth password grant -client_credentials
: with OAuth client credentials grant -authorization_code
: with authorization code flow -refresh_token
with refresh token grant. - token
Headers List<String>Names - Extra header names passed to the token endpoint.
- token
Headers StringPrefix - Add a prefix to the token endpoint response headers before forwarding them to the downstream client.
- token
Headers List<String>Replays - The names of token endpoint response headers to forward to the downstream client.
- token
Headers List<String>Values - Extra header values passed to the token endpoint.
- token
Post List<String>Args Clients - Pass extra arguments from the client to the OpenID-Connect plugin. If arguments exist, the client can pass them using: - Query parameters - Request Body - Request Header This parameter can be used with
scope
values, like this:config.token_post_args_client=scope
In this case, the token would take thescope
value from the query parameter or from the request body or from the header and send it to the token endpoint. - token
Post List<String>Args Names - Extra post argument names passed to the token endpoint.
- token
Post List<String>Args Values - Extra post argument values passed to the token endpoint.
- Boolean
- Destroy any active session for the unauthorized requests.
- String
- The error message for the unauthorized requests (when not using the redirection).
- List<String>
- Where to redirect the client on unauthorized requests.
- unexpected
Redirect List<String>Uris - Where to redirect the client when unexpected errors happen with the requests.
- upstream
Access StringToken Header - The upstream access token header.
- upstream
Access StringToken Jwk Header - The upstream access token JWK header.
- upstream
Headers List<String>Claims - The upstream header claims. Only top level claims are supported.
- upstream
Headers List<String>Names - The upstream header names for the claim values.
- upstream
Id StringToken Header - The upstream id token header.
- upstream
Id StringToken Jwk Header - The upstream id token JWK header.
- upstream
Introspection StringHeader - The upstream introspection header.
- upstream
Introspection StringJwt Header - The upstream introspection JWT header.
- upstream
Refresh StringToken Header - The upstream refresh token header.
- upstream
Session StringId Header - The upstream session id header.
- upstream
User StringInfo Header - The upstream user info header.
- upstream
User StringInfo Jwt Header - The upstream user info JWT header (in case the user info returns a JWT response).
- userinfo
Accept String - The value of
Accept
header for user info requests: -application/json
: user info response as JSON -application/jwt
: user info response as JWT (from the obsolete IETF draft document). - userinfo
Endpoint String - The user info endpoint. If set it overrides the value in
userinfo_endpoint
returned by the discovery endpoint. - userinfo
Headers List<String>Clients - Extra headers passed from the client to the user info endpoint.
- userinfo
Headers List<String>Names - Extra header names passed to the user info endpoint.
- userinfo
Headers List<String>Values - Extra header values passed to the user info endpoint.
- userinfo
Query List<String>Args Clients - Extra query arguments passed from the client to the user info endpoint.
- userinfo
Query List<String>Args Names - Extra query argument names passed to the user info endpoint.
- userinfo
Query List<String>Args Values - Extra query argument values passed to the user info endpoint.
- using
Pseudo BooleanIssuer - If the plugin uses a pseudo issuer. When set to true, the plugin will not discover the configuration from the issuer URL specified with
config.issuer
. - verify
Claims Boolean - Verify tokens for standard claims.
- verify
Nonce Boolean - Verify nonce on authorization code flow.
- verify
Parameters Boolean - Verify plugin configuration against discovery.
- verify
Signature Boolean - Verify signature of tokens.
GetGatewayPluginOpenidConnectConfigClientJwk
GetGatewayPluginOpenidConnectConfigClusterCacheRedis
- Cluster
Max doubleRedirections - Maximum retry attempts for redirection.
- Cluster
Nodes List<GetGateway Plugin Openid Connect Config Cluster Cache Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database double
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool doubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port double
- An integer representing a port number between 0 and 65535, inclusive.
- Read
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes List<GetGateway Plugin Openid Connect Config Cluster Cache Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- Cluster
Max float64Redirections - Maximum retry attempts for redirection.
- Cluster
Nodes []GetGateway Plugin Openid Connect Config Cluster Cache Redis Cluster Node - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database float64
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog float64 - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool float64Size - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port float64
- An integer representing a port number between 0 and 65535, inclusive.
- Read
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes []GetGateway Plugin Openid Connect Config Cluster Cache Redis Sentinel Node - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max DoubleRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<GetGateway Plugin Openid Connect Config Cluster Cache Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Double
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool DoubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Double
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<GetGateway Plugin Openid Connect Config Cluster Cache Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max numberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes GetGateway Plugin Openid Connect Config Cluster Cache Redis Cluster Node[] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is booleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database number
- Database to use for the Redis connection when using the
redis
strategy - host string
- A string representing a host name, such as example.com.
- keepalive
Backlog number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool numberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port number
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes GetGateway Plugin Openid Connect Config Cluster Cache Redis Sentinel Node[] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name string - A string representing an SNI (server name indication) value for TLS.
- ssl boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster_
max_ floatredirections - Maximum retry attempts for redirection.
- cluster_
nodes Sequence[GetGateway Plugin Openid Connect Config Cluster Cache Redis Cluster Node] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection_
is_ boolproxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database float
- Database to use for the Redis connection when using the
redis
strategy - host str
- A string representing a host name, such as example.com.
- keepalive_
backlog float - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive_
pool_ floatsize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password str
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port float
- An integer representing a port number between 0 and 65535, inclusive.
- read_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel_
master str - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel_
nodes Sequence[GetGateway Plugin Openid Connect Config Cluster Cache Redis Sentinel Node] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel_
password str - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel_
role str - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel_
username str - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server_
name str - A string representing an SNI (server name indication) value for TLS.
- ssl bool
- If set to true, uses SSL to connect to Redis.
- ssl_
verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username str
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max NumberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<Property Map> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Number
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool NumberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Number
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<Property Map> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
GetGatewayPluginOpenidConnectConfigClusterCacheRedisClusterNode
GetGatewayPluginOpenidConnectConfigClusterCacheRedisSentinelNode
GetGatewayPluginOpenidConnectConfigRedis
- Cluster
Max doubleRedirections - Maximum retry attempts for redirection.
- Cluster
Nodes List<GetGateway Plugin Openid Connect Config Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database double
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool doubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port double
- An integer representing a port number between 0 and 65535, inclusive.
- Prefix string
- The Redis session key prefix.
- Read
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes List<GetGateway Plugin Openid Connect Config Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Socket string
- The Redis unix socket path.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- Cluster
Max float64Redirections - Maximum retry attempts for redirection.
- Cluster
Nodes []GetGateway Plugin Openid Connect Config Redis Cluster Node - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database float64
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog float64 - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool float64Size - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port float64
- An integer representing a port number between 0 and 65535, inclusive.
- Prefix string
- The Redis session key prefix.
- Read
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes []GetGateway Plugin Openid Connect Config Redis Sentinel Node - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Socket string
- The Redis unix socket path.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max DoubleRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<GetGateway Plugin Openid Connect Config Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Double
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool DoubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Double
- An integer representing a port number between 0 and 65535, inclusive.
- prefix String
- The Redis session key prefix.
- read
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<GetGateway Plugin Openid Connect Config Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- socket String
- The Redis unix socket path.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max numberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes GetGateway Plugin Openid Connect Config Redis Cluster Node[] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is booleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database number
- Database to use for the Redis connection when using the
redis
strategy - host string
- A string representing a host name, such as example.com.
- keepalive
Backlog number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool numberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port number
- An integer representing a port number between 0 and 65535, inclusive.
- prefix string
- The Redis session key prefix.
- read
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes GetGateway Plugin Openid Connect Config Redis Sentinel Node[] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name string - A string representing an SNI (server name indication) value for TLS.
- socket string
- The Redis unix socket path.
- ssl boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster_
max_ floatredirections - Maximum retry attempts for redirection.
- cluster_
nodes Sequence[GetGateway Plugin Openid Connect Config Redis Cluster Node] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection_
is_ boolproxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database float
- Database to use for the Redis connection when using the
redis
strategy - host str
- A string representing a host name, such as example.com.
- keepalive_
backlog float - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive_
pool_ floatsize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password str
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port float
- An integer representing a port number between 0 and 65535, inclusive.
- prefix str
- The Redis session key prefix.
- read_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel_
master str - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel_
nodes Sequence[GetGateway Plugin Openid Connect Config Redis Sentinel Node] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel_
password str - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel_
role str - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel_
username str - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server_
name str - A string representing an SNI (server name indication) value for TLS.
- socket str
- The Redis unix socket path.
- ssl bool
- If set to true, uses SSL to connect to Redis.
- ssl_
verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username str
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max NumberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<Property Map> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Number
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool NumberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Number
- An integer representing a port number between 0 and 65535, inclusive.
- prefix String
- The Redis session key prefix.
- read
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<Property Map> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- socket String
- The Redis unix socket path.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
GetGatewayPluginOpenidConnectConfigRedisClusterNode
GetGatewayPluginOpenidConnectConfigRedisSentinelNode
GetGatewayPluginOpenidConnectOrdering
GetGatewayPluginOpenidConnectOrderingAfter
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginOpenidConnectOrderingBefore
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginOpenidConnectRoute
- Id string
- Id string
- id String
- id string
- id str
- id String
GetGatewayPluginOpenidConnectService
- Id string
- Id string
- id String
- id string
- id str
- id String
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnect
Terraform Provider.