JWTRule

JWTRule

JSON Web Token (JWT) token format for authentication as defined by RFC 7519. See OAuth 2.0 and OIDC 1.0 for how this is used in the whole authentication flow.

Examples:

Spec for a JWT that is issued by https://example.com, with the audience claims must be either bookstore_android.apps.example.com or bookstore_web.apps.example.com. The token should be presented at the Authorization header (default). The JSON Web Key Set (JWKS) will be discovered following OpenID Connect protocol.

  1. issuer: https://example.com
  2. audiences:
  3. - bookstore_android.apps.example.com
  4. bookstore_web.apps.example.com

This example specifies a token in a non-default location (x-goog-iap-jwt-assertion header). It also defines the URI to fetch JWKS explicitly.

  1. issuer: https://example.com
  2. jwksUri: https://example.com/.secret/jwks.json
  3. fromHeaders:
  4. - "x-goog-iap-jwt-assertion"
FieldTypeDescriptionRequired
issuerstring

Identifies the issuer that issued the JWT. See issuer A JWT with different iss claim will be rejected.

Example: https://foobar.auth0.com Example: 1234567-compute@developer.gserviceaccount.com

Yes
audiencesstring[]

The list of JWT audiences that are allowed to access. A JWT containing any of these audiences will be accepted.

The service name will be accepted if audiences is empty.

Example:

  1. audiences:
  2. - bookstore_android.apps.example.com
  3. bookstore_web.apps.example.com
No
jwksUristring

URL of the provider’s public key set to validate signature of the JWT. See OpenID Discovery.

Optional if the key set document can either (a) be retrieved from OpenID Discovery of the issuer or (b) inferred from the email domain of the issuer (e.g. a Google service account).

Example: https://www.googleapis.com/oauth2/v1/certs

Note: Only one of jwksUri and jwks should be used.

No
jwksstring

JSON Web Key Set of public keys to validate signature of the JWT. See https://auth0.com/docs/jwks.

Note: Only one of jwksUri and jwks should be used.

No
fromHeadersJWTHeader[]

List of header locations from which JWT is expected. For example, below is the location spec if JWT is expected to be found in x-jwt-assertion header, and have Bearer prefix:

  1. fromHeaders:
  2. - name: x-jwt-assertion
  3. prefix: Bearer

Note: Requests with multiple tokens (at different locations) are not supported, the output principal of such requests is undefined.

No
fromParamsstring[]

List of query parameters from which JWT is expected. For example, if JWT is provided via query parameter my_token (e.g /path?my_token=<JWT>), the config is:

  1. fromParams:
  2. - my_token

Note: Requests with multiple tokens (at different locations) are not supported, the output principal of such requests is undefined.

No
outputPayloadToHeaderstring

This field specifies the header name to output a successfully verified JWT payload to the backend. The forwarded data is base64_encoded(jwt_payload_in_JSON). If it is not specified, the payload will not be emitted.

No
fromCookiesstring[]

List of cookie names from which JWT is expected. // For example, if config is:

  1. from_cookies:
  2. - auth-token

Then JWT will be extracted from auth-token cookie in the request.

Note: Requests with multiple tokens (at different locations) are not supported, the output principal of such requests is undefined.

No
forwardOriginalTokenbool

If set to true, the original token will be kept for the upstream request. Default is false.

No
outputClaimToHeadersClaimToHeader[]

This field specifies a list of operations to copy the claim to HTTP headers on a successfully verified token. This differs from the output_payload_to_header by allowing outputting individual claims instead of the whole payload. The header specified in each operation in the list must be unique. Nested claims of type string/int/bool is supported as well.

  1. outputClaimToHeaders:
  2. - header: x-my-company-jwt-group
  3. claim: my-group
  4. - header: x-test-environment-flag
  5. claim: test-flag
  6. - header: x-jwt-claim-group
  7. claim: nested.key.group

[Experimental] This feature is a experimental feature.

No
timeoutDuration

The maximum amount of time that the resolver, determined by the PILOT_JWT_ENABLE_REMOTE_JWKS environment variable, will spend waiting for the JWKS to be fetched. Default is 5s.

No

JWTHeader

This message specifies a header location to extract JWT token.

FieldTypeDescriptionRequired
namestring

The HTTP header name.

Yes
prefixstring

The prefix that should be stripped before decoding the token. For example, for Authorization: Bearer <token>, prefix=Bearer with a space at the end. If the header doesn’t have this exact prefix, it is considered invalid.

No

ClaimToHeader

This message specifies the detail for copying claim to header.

FieldTypeDescriptionRequired
headerstring

The name of the header to be created. The header will be overridden if it already exists in the request.

No
claimstring

The name of the claim to be copied from. Only claim of type string/int/bool is supported. The header will not be there if the claim does not exist or the type of the claim is not supported.

No