konnect 2.4.1 published on Thursday, Mar 13, 2025 by kong
konnect.getGatewayPluginJwtSigner
Explore with Pulumi AI
Using getGatewayPluginJwtSigner
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayPluginJwtSigner(args: GetGatewayPluginJwtSignerArgs, opts?: InvokeOptions): Promise<GetGatewayPluginJwtSignerResult>
function getGatewayPluginJwtSignerOutput(args: GetGatewayPluginJwtSignerOutputArgs, opts?: InvokeOptions): Output<GetGatewayPluginJwtSignerResult>def get_gateway_plugin_jwt_signer(control_plane_id: Optional[str] = None,
                                  opts: Optional[InvokeOptions] = None) -> GetGatewayPluginJwtSignerResult
def get_gateway_plugin_jwt_signer_output(control_plane_id: Optional[pulumi.Input[str]] = None,
                                  opts: Optional[InvokeOptions] = None) -> Output[GetGatewayPluginJwtSignerResult]func LookupGatewayPluginJwtSigner(ctx *Context, args *LookupGatewayPluginJwtSignerArgs, opts ...InvokeOption) (*LookupGatewayPluginJwtSignerResult, error)
func LookupGatewayPluginJwtSignerOutput(ctx *Context, args *LookupGatewayPluginJwtSignerOutputArgs, opts ...InvokeOption) LookupGatewayPluginJwtSignerResultOutput> Note: This function is named LookupGatewayPluginJwtSigner in the Go SDK.
public static class GetGatewayPluginJwtSigner 
{
    public static Task<GetGatewayPluginJwtSignerResult> InvokeAsync(GetGatewayPluginJwtSignerArgs args, InvokeOptions? opts = null)
    public static Output<GetGatewayPluginJwtSignerResult> Invoke(GetGatewayPluginJwtSignerInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetGatewayPluginJwtSignerResult> getGatewayPluginJwtSigner(GetGatewayPluginJwtSignerArgs args, InvokeOptions options)
public static Output<GetGatewayPluginJwtSignerResult> getGatewayPluginJwtSigner(GetGatewayPluginJwtSignerArgs args, InvokeOptions options)
fn::invoke:
  function: konnect:index/getGatewayPluginJwtSigner:getGatewayPluginJwtSigner
  arguments:
    # arguments dictionaryThe following arguments are supported:
- ControlPlane stringId 
- ControlPlane stringId 
- controlPlane StringId 
- controlPlane stringId 
- control_plane_ strid 
- controlPlane StringId 
getGatewayPluginJwtSigner Result
The following output properties are available:
- Config
GetGateway Plugin Jwt Signer Config 
- ControlPlane stringId 
- CreatedAt double
- Enabled bool
- Id string
- InstanceName string
- Ordering
GetGateway Plugin Jwt Signer Ordering 
- Protocols List<string>
- Route
GetGateway Plugin Jwt Signer Route 
- Service
GetGateway Plugin Jwt Signer Service 
- List<string>
- UpdatedAt double
- Config
GetGateway Plugin Jwt Signer Config 
- ControlPlane stringId 
- CreatedAt float64
- Enabled bool
- Id string
- InstanceName string
- Ordering
GetGateway Plugin Jwt Signer Ordering 
- Protocols []string
- Route
GetGateway Plugin Jwt Signer Route 
- Service
GetGateway Plugin Jwt Signer Service 
- []string
- UpdatedAt float64
- config
GetGateway Plugin Jwt Signer Config 
- controlPlane StringId 
- createdAt Double
- enabled Boolean
- id String
- instanceName String
- ordering
GetGateway Plugin Jwt Signer Ordering 
- protocols List<String>
- route
GetGateway Plugin Jwt Signer Route 
- service
GetGateway Plugin Jwt Signer Service 
- List<String>
- updatedAt Double
- config
GetGateway Plugin Jwt Signer Config 
- controlPlane stringId 
- createdAt number
- enabled boolean
- id string
- instanceName string
- ordering
GetGateway Plugin Jwt Signer Ordering 
- protocols string[]
- route
GetGateway Plugin Jwt Signer Route 
- service
GetGateway Plugin Jwt Signer Service 
- string[]
- updatedAt number
- config
GetGateway Plugin Jwt Signer Config 
- control_plane_ strid 
- created_at float
- enabled bool
- id str
- instance_name str
- ordering
GetGateway Plugin Jwt Signer Ordering 
- protocols Sequence[str]
- route
GetGateway Plugin Jwt Signer Route 
- service
GetGateway Plugin Jwt Signer Service 
- Sequence[str]
- updated_at float
- config Property Map
- controlPlane StringId 
- createdAt Number
- enabled Boolean
- id String
- instanceName String
- ordering Property Map
- protocols List<String>
- route Property Map
- service Property Map
- List<String>
- updatedAt Number
Supporting Types
GetGatewayPluginJwtSignerConfig     
- AccessToken List<string>Consumer Bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- AccessToken List<string>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- AccessToken stringIntrospection Body Args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- AccessToken List<string>Introspection Consumer Bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- AccessToken List<string>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- AccessToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- AccessToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- AccessToken List<string>Introspection Jwt Claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- AccessToken doubleIntrospection Leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- AccessToken List<string>Introspection Scopes Claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- AccessToken List<string>Introspection Scopes Requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- AccessToken doubleIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- AccessToken stringIssuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- AccessToken stringJwks Uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- AccessToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- AccessToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- AccessToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- AccessToken doubleJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- AccessToken stringKeyset 
- The name of the keyset containing signing keys.
- AccessToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- AccessToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- AccessToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- AccessToken doubleKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- AccessToken doubleLeeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- AccessToken boolOptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- AccessToken stringRequest Header 
- This parameter tells the name of the header where to look for the access token.
- AccessToken List<string>Scopes Claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- AccessToken List<string>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- AccessToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- AccessToken stringUpstream Header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- AccessToken doubleUpstream Leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- AddAccess Dictionary<string, string>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- AddChannel Dictionary<string, string>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- AddClaims Dictionary<string, string>
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- CacheAccess boolToken Introspection 
- Whether to cache access token introspection results.
- CacheChannel boolToken Introspection 
- Whether to cache channel token introspection results.
- ChannelToken List<string>Consumer Bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- ChannelToken List<string>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- string
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- ChannelToken stringIntrospection Body Args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- ChannelToken List<string>Introspection Consumer Bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- ChannelToken List<string>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- ChannelToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- ChannelToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- ChannelToken List<string>Introspection Jwt Claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- ChannelToken doubleIntrospection Leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- ChannelToken List<string>Introspection Scopes Claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- ChannelToken List<string>Introspection Scopes Requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- ChannelToken doubleIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- ChannelToken stringIssuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- ChannelToken stringJwks Uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- ChannelToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- ChannelToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- ChannelToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- ChannelToken doubleJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- ChannelToken stringKeyset 
- The name of the keyset containing signing keys.
- ChannelToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- ChannelToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- ChannelToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- ChannelToken doubleKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- ChannelToken doubleLeeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- ChannelToken boolOptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- ChannelToken stringRequest Header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- ChannelToken List<string>Scopes Claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- ChannelToken List<string>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- ChannelToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- ChannelToken stringUpstream Header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- ChannelToken doubleUpstream Leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- EnableAccess boolToken Introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- EnableChannel boolToken Introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- EnableHs boolSignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- EnableInstrumentation bool
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- OriginalAccess stringToken Upstream Header 
- The HTTP header name used to store the original access token.
- OriginalChannel stringToken Upstream Header 
- The HTTP header name used to store the original channel token.
- Realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- RemoveAccess List<string>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- RemoveChannel List<string>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- SetAccess Dictionary<string, string>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- SetChannel Dictionary<string, string>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- SetClaims Dictionary<string, string>
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- TrustAccess boolToken Introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- TrustChannel boolToken Introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- VerifyAccess boolToken Expiry 
- Quickly turn access token expiry verification off and on as needed.
- VerifyAccess boolToken Introspection Expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- VerifyAccess boolToken Introspection Scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- VerifyAccess boolToken Scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- VerifyAccess boolToken Signature 
- Quickly turn access token signature verification off and on as needed.
- VerifyChannel boolToken Expiry 
- VerifyChannel boolToken Introspection Expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- VerifyChannel boolToken Introspection Scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- VerifyChannel boolToken Scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- VerifyChannel boolToken Signature 
- Quickly turn on/off the channel token signature verification.
- AccessToken []stringConsumer Bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- AccessToken []stringConsumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- AccessToken stringIntrospection Body Args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- AccessToken []stringIntrospection Consumer Bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- AccessToken []stringIntrospection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- AccessToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- AccessToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- AccessToken []stringIntrospection Jwt Claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- AccessToken float64Introspection Leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- AccessToken []stringIntrospection Scopes Claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- AccessToken []stringIntrospection Scopes Requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- AccessToken float64Introspection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- AccessToken stringIssuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- AccessToken stringJwks Uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- AccessToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- AccessToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- AccessToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- AccessToken float64Jwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- AccessToken stringKeyset 
- The name of the keyset containing signing keys.
- AccessToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- AccessToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- AccessToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- AccessToken float64Keyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- AccessToken float64Leeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- AccessToken boolOptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- AccessToken stringRequest Header 
- This parameter tells the name of the header where to look for the access token.
- AccessToken []stringScopes Claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- AccessToken []stringScopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- AccessToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- AccessToken stringUpstream Header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- AccessToken float64Upstream Leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- AddAccess map[string]stringToken Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- AddChannel map[string]stringToken Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- AddClaims map[string]string
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- CacheAccess boolToken Introspection 
- Whether to cache access token introspection results.
- CacheChannel boolToken Introspection 
- Whether to cache channel token introspection results.
- ChannelToken []stringConsumer Bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- ChannelToken []stringConsumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- string
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- ChannelToken stringIntrospection Body Args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- ChannelToken []stringIntrospection Consumer Bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- ChannelToken []stringIntrospection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- ChannelToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- ChannelToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- ChannelToken []stringIntrospection Jwt Claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- ChannelToken float64Introspection Leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- ChannelToken []stringIntrospection Scopes Claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- ChannelToken []stringIntrospection Scopes Requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- ChannelToken float64Introspection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- ChannelToken stringIssuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- ChannelToken stringJwks Uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- ChannelToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- ChannelToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- ChannelToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- ChannelToken float64Jwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- ChannelToken stringKeyset 
- The name of the keyset containing signing keys.
- ChannelToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- ChannelToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- ChannelToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- ChannelToken float64Keyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- ChannelToken float64Leeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- ChannelToken boolOptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- ChannelToken stringRequest Header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- ChannelToken []stringScopes Claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- ChannelToken []stringScopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- ChannelToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- ChannelToken stringUpstream Header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- ChannelToken float64Upstream Leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- EnableAccess boolToken Introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- EnableChannel boolToken Introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- EnableHs boolSignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- EnableInstrumentation bool
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- OriginalAccess stringToken Upstream Header 
- The HTTP header name used to store the original access token.
- OriginalChannel stringToken Upstream Header 
- The HTTP header name used to store the original channel token.
- Realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- RemoveAccess []stringToken Claims 
- remove claims. It should be an array, and each element is a claim key string.
- RemoveChannel []stringToken Claims 
- remove claims. It should be an array, and each element is a claim key string.
- SetAccess map[string]stringToken Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- SetChannel map[string]stringToken Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- SetClaims map[string]string
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- TrustAccess boolToken Introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- TrustChannel boolToken Introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- VerifyAccess boolToken Expiry 
- Quickly turn access token expiry verification off and on as needed.
- VerifyAccess boolToken Introspection Expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- VerifyAccess boolToken Introspection Scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- VerifyAccess boolToken Scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- VerifyAccess boolToken Signature 
- Quickly turn access token signature verification off and on as needed.
- VerifyChannel boolToken Expiry 
- VerifyChannel boolToken Introspection Expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- VerifyChannel boolToken Introspection Scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- VerifyChannel boolToken Scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- VerifyChannel boolToken Signature 
- Quickly turn on/off the channel token signature verification.
- accessToken List<String>Consumer Bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- accessToken List<String>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- String
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- accessToken StringIntrospection Body Args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- accessToken List<String>Introspection Consumer Bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- accessToken List<String>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- accessToken StringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- accessToken StringIntrospection Hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- accessToken List<String>Introspection Jwt Claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- accessToken DoubleIntrospection Leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- accessToken List<String>Introspection Scopes Claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- accessToken List<String>Introspection Scopes Requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- accessToken DoubleIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- accessToken StringIssuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- accessToken StringJwks Uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- accessToken StringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- accessToken StringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- accessToken StringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- accessToken DoubleJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- accessToken StringKeyset 
- The name of the keyset containing signing keys.
- accessToken StringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- accessToken StringKeyset Client Password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- accessToken StringKeyset Client Username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- accessToken DoubleKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- accessToken DoubleLeeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- accessToken BooleanOptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- accessToken StringRequest Header 
- This parameter tells the name of the header where to look for the access token.
- accessToken List<String>Scopes Claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- accessToken List<String>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- accessToken StringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- accessToken StringUpstream Header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- accessToken DoubleUpstream Leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- addAccess Map<String,String>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addChannel Map<String,String>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addClaims Map<String,String>
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cacheAccess BooleanToken Introspection 
- Whether to cache access token introspection results.
- cacheChannel BooleanToken Introspection 
- Whether to cache channel token introspection results.
- channelToken List<String>Consumer Bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- channelToken List<String>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- String
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- channelToken StringIntrospection Body Args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- channelToken List<String>Introspection Consumer Bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- channelToken List<String>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- channelToken StringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- channelToken StringIntrospection Hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- channelToken List<String>Introspection Jwt Claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- channelToken DoubleIntrospection Leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- channelToken List<String>Introspection Scopes Claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- channelToken List<String>Introspection Scopes Requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- channelToken DoubleIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- channelToken StringIssuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- channelToken StringJwks Uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- channelToken StringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- channelToken StringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channelToken StringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channelToken DoubleJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- channelToken StringKeyset 
- The name of the keyset containing signing keys.
- channelToken StringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- channelToken StringKeyset Client Password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channelToken StringKeyset Client Username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channelToken DoubleKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- channelToken DoubleLeeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- channelToken BooleanOptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- channelToken StringRequest Header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- channelToken List<String>Scopes Claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- channelToken List<String>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- channelToken StringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- channelToken StringUpstream Header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- channelToken DoubleUpstream Leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- enableAccess BooleanToken Introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- enableChannel BooleanToken Introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- enableHs BooleanSignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- enableInstrumentation Boolean
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- originalAccess StringToken Upstream Header 
- The HTTP header name used to store the original access token.
- originalChannel StringToken Upstream Header 
- The HTTP header name used to store the original channel token.
- realm String
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- removeAccess List<String>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- removeChannel List<String>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- setAccess Map<String,String>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setChannel Map<String,String>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setClaims Map<String,String>
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trustAccess BooleanToken Introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- trustChannel BooleanToken Introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verifyAccess BooleanToken Expiry 
- Quickly turn access token expiry verification off and on as needed.
- verifyAccess BooleanToken Introspection Expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- verifyAccess BooleanToken Introspection Scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- verifyAccess BooleanToken Scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- verifyAccess BooleanToken Signature 
- Quickly turn access token signature verification off and on as needed.
- verifyChannel BooleanToken Expiry 
- verifyChannel BooleanToken Introspection Expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- verifyChannel BooleanToken Introspection Scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- verifyChannel BooleanToken Scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- verifyChannel BooleanToken Signature 
- Quickly turn on/off the channel token signature verification.
- accessToken string[]Consumer Bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- accessToken string[]Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- string
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- accessToken stringIntrospection Body Args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- accessToken string[]Introspection Consumer Bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- accessToken string[]Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- accessToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- accessToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- accessToken string[]Introspection Jwt Claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- accessToken numberIntrospection Leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- accessToken string[]Introspection Scopes Claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- accessToken string[]Introspection Scopes Requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- accessToken numberIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- accessToken stringIssuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- accessToken stringJwks Uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- accessToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- accessToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- accessToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- accessToken numberJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- accessToken stringKeyset 
- The name of the keyset containing signing keys.
- accessToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- accessToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- accessToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- accessToken numberKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- accessToken numberLeeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- accessToken booleanOptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- accessToken stringRequest Header 
- This parameter tells the name of the header where to look for the access token.
- accessToken string[]Scopes Claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- accessToken string[]Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- accessToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- accessToken stringUpstream Header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- accessToken numberUpstream Leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- addAccess {[key: string]: string}Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addChannel {[key: string]: string}Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addClaims {[key: string]: string}
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cacheAccess booleanToken Introspection 
- Whether to cache access token introspection results.
- cacheChannel booleanToken Introspection 
- Whether to cache channel token introspection results.
- channelToken string[]Consumer Bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- channelToken string[]Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- string
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- channelToken stringIntrospection Body Args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- channelToken string[]Introspection Consumer Bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- channelToken string[]Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- channelToken stringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- channelToken stringIntrospection Hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- channelToken string[]Introspection Jwt Claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- channelToken numberIntrospection Leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- channelToken string[]Introspection Scopes Claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- channelToken string[]Introspection Scopes Requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- channelToken numberIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- channelToken stringIssuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- channelToken stringJwks Uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- channelToken stringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- channelToken stringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channelToken stringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channelToken numberJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- channelToken stringKeyset 
- The name of the keyset containing signing keys.
- channelToken stringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- channelToken stringKeyset Client Password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channelToken stringKeyset Client Username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channelToken numberKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- channelToken numberLeeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- channelToken booleanOptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- channelToken stringRequest Header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- channelToken string[]Scopes Claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- channelToken string[]Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- channelToken stringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- channelToken stringUpstream Header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- channelToken numberUpstream Leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- enableAccess booleanToken Introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- enableChannel booleanToken Introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- enableHs booleanSignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- enableInstrumentation boolean
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- originalAccess stringToken Upstream Header 
- The HTTP header name used to store the original access token.
- originalChannel stringToken Upstream Header 
- The HTTP header name used to store the original channel token.
- realm string
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- removeAccess string[]Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- removeChannel string[]Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- setAccess {[key: string]: string}Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setChannel {[key: string]: string}Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setClaims {[key: string]: string}
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trustAccess booleanToken Introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- trustChannel booleanToken Introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verifyAccess booleanToken Expiry 
- Quickly turn access token expiry verification off and on as needed.
- verifyAccess booleanToken Introspection Expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- verifyAccess booleanToken Introspection Scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- verifyAccess booleanToken Scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- verifyAccess booleanToken Signature 
- Quickly turn access token signature verification off and on as needed.
- verifyChannel booleanToken Expiry 
- verifyChannel booleanToken Introspection Expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- verifyChannel booleanToken Introspection Scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- verifyChannel booleanToken Scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- verifyChannel booleanToken Signature 
- Quickly turn on/off the channel token signature verification.
- access_token_ Sequence[str]consumer_ bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- access_token_ Sequence[str]consumer_ claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- str
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- access_token_ strintrospection_ body_ args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- access_token_ Sequence[str]introspection_ consumer_ bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- access_token_ Sequence[str]introspection_ consumer_ claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- access_token_ strintrospection_ endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- access_token_ strintrospection_ hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- access_token_ Sequence[str]introspection_ jwt_ claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- access_token_ floatintrospection_ leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- access_token_ Sequence[str]introspection_ scopes_ claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- access_token_ Sequence[str]introspection_ scopes_ requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- access_token_ floatintrospection_ timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- access_token_ strissuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- access_token_ strjwks_ uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- access_token_ strjwks_ uri_ client_ certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- access_token_ strjwks_ uri_ client_ password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- access_token_ strjwks_ uri_ client_ username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- access_token_ floatjwks_ uri_ rotate_ period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- access_token_ strkeyset 
- The name of the keyset containing signing keys.
- access_token_ strkeyset_ client_ certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- access_token_ strkeyset_ client_ password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- access_token_ strkeyset_ client_ username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- access_token_ floatkeyset_ rotate_ period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- access_token_ floatleeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- access_token_ booloptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- access_token_ strrequest_ header 
- This parameter tells the name of the header where to look for the access token.
- access_token_ Sequence[str]scopes_ claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- access_token_ Sequence[str]scopes_ requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- access_token_ strsigning_ algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- access_token_ strupstream_ header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- access_token_ floatupstream_ leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- add_access_ Mapping[str, str]token_ claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add_channel_ Mapping[str, str]token_ claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- add_claims Mapping[str, str]
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cache_access_ booltoken_ introspection 
- Whether to cache access token introspection results.
- cache_channel_ booltoken_ introspection 
- Whether to cache channel token introspection results.
- channel_token_ Sequence[str]consumer_ bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- channel_token_ Sequence[str]consumer_ claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- str
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- channel_token_ strintrospection_ body_ args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- channel_token_ Sequence[str]introspection_ consumer_ bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- channel_token_ Sequence[str]introspection_ consumer_ claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- channel_token_ strintrospection_ endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- channel_token_ strintrospection_ hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- channel_token_ Sequence[str]introspection_ jwt_ claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- channel_token_ floatintrospection_ leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- channel_token_ Sequence[str]introspection_ scopes_ claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- channel_token_ Sequence[str]introspection_ scopes_ requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- channel_token_ floatintrospection_ timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- channel_token_ strissuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- channel_token_ strjwks_ uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- channel_token_ strjwks_ uri_ client_ certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- channel_token_ strjwks_ uri_ client_ password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channel_token_ strjwks_ uri_ client_ username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channel_token_ floatjwks_ uri_ rotate_ period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- channel_token_ strkeyset 
- The name of the keyset containing signing keys.
- channel_token_ strkeyset_ client_ certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- channel_token_ strkeyset_ client_ password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channel_token_ strkeyset_ client_ username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channel_token_ floatkeyset_ rotate_ period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- channel_token_ floatleeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- channel_token_ booloptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- channel_token_ strrequest_ header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- channel_token_ Sequence[str]scopes_ claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- channel_token_ Sequence[str]scopes_ requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- channel_token_ strsigning_ algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- channel_token_ strupstream_ header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- channel_token_ floatupstream_ leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- enable_access_ booltoken_ introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- enable_channel_ booltoken_ introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- enable_hs_ boolsignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- enable_instrumentation bool
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- original_access_ strtoken_ upstream_ header 
- The HTTP header name used to store the original access token.
- original_channel_ strtoken_ upstream_ header 
- The HTTP header name used to store the original channel token.
- realm str
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- remove_access_ Sequence[str]token_ claims 
- remove claims. It should be an array, and each element is a claim key string.
- remove_channel_ Sequence[str]token_ claims 
- remove claims. It should be an array, and each element is a claim key string.
- set_access_ Mapping[str, str]token_ claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set_channel_ Mapping[str, str]token_ claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- set_claims Mapping[str, str]
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trust_access_ booltoken_ introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- trust_channel_ booltoken_ introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verify_access_ booltoken_ expiry 
- Quickly turn access token expiry verification off and on as needed.
- verify_access_ booltoken_ introspection_ expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- verify_access_ booltoken_ introspection_ scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- verify_access_ booltoken_ scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- verify_access_ booltoken_ signature 
- Quickly turn access token signature verification off and on as needed.
- verify_channel_ booltoken_ expiry 
- verify_channel_ booltoken_ introspection_ expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- verify_channel_ booltoken_ introspection_ scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- verify_channel_ booltoken_ scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- verify_channel_ booltoken_ signature 
- Quickly turn on/off the channel token signature verification.
- accessToken List<String>Consumer Bies 
- When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id,username, andcustom_id.
- accessToken List<String>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, suborusername) in an access token to Kong consumer entity.
- String
- If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorizationheader's value with this configuration parameter.
- accessToken StringIntrospection Body Args 
- This parameter allows you to pass URL encoded request body arguments. For example: resource=ora=1&b=&c.
- accessToken List<String>Introspection Consumer Bies 
- When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values.
- accessToken List<String>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in access token introspection results to the Kong consumer entity.
- accessToken StringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
- accessToken StringIntrospection Hint 
- If you need to give hintparameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sendshint=access_token.
- accessToken List<String>Introspection Jwt Claims 
- If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with401 Unauthorized.
- accessToken NumberIntrospection Leeway 
- Adjusts clock skew between the token issuer introspection results and Kong. The value is added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspectionexpiryverification altogether withconfig.verify_access_token_introspection_expiry.
- accessToken List<String>Introspection Scopes Claims 
- Specify the claim/property in access token introspection results (JSON) to be verified against values ofconfig.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use[ "realm_access", "roles" ], hich can be given asrealm_access,roles(form post). If the claim is not found in access token introspection results, and you have specifiedconfig.access_token_introspection_scopes_required, the plugin responds with403 Forbidden.
- accessToken List<String>Introspection Scopes Requireds 
- Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
- accessToken NumberIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton access token introspection.
- accessToken StringIssuer 
- The issclaim of a signed or re-signed access token is set to this value. Originalissclaim of the incoming token (possibly introspected) is stored inoriginal_issclaim of the newly signed access token.
- accessToken StringJwks Uri 
- Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
- accessToken StringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- accessToken StringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_username
- accessToken StringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if access_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withaccess_token_jwks_uri_client_password
- accessToken NumberJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation.
- accessToken StringKeyset 
- The name of the keyset containing signing keys.
- accessToken StringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_keysetis an https uri that requires mTLS Auth.
- accessToken StringKeyset Client Password 
- The client password that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_username
- accessToken StringKeyset Client Username 
- The client username that will be used to authenticate Kong if access_token_keysetis a uri that requires Basic Auth. Should be configured together withaccess_token_keyset_client_password
- accessToken NumberKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation.
- accessToken NumberLeeway 
- Adjusts clock skew between the token issuer and Kong. The value is added to the token's expclaim before checking token expiry against Kong servers' current time in seconds. You can disable access tokenexpiryverification altogether withconfig.verify_access_token_expiry.
- accessToken BooleanOptional 
- If an access token is not provided or no config.access_token_request_headeris specified, the plugin cannot verify the access token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect
- accessToken StringRequest Header 
- This parameter tells the name of the header where to look for the access token.
- accessToken List<String>Scopes Claims 
- Specify the claim in an access token to verify against values of config.access_token_scopes_required.
- accessToken List<String>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
- accessToken StringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. Theconfig.access_token_issuerspecifies whichkeysetis used to sign the new token issued by Kong using the specified signing algorithm.
- accessToken StringUpstream Header 
- Removes the config.access_token_request_headerfrom the request after reading its value. Withconfig.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as usenullor""(empty string), the plugin does not even try to sign or re-sign the token.
- accessToken NumberUpstream Leeway 
- If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's expclaim.
- addAccess Map<String>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addChannel Map<String>Token Claims 
- Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- addClaims Map<String>
- Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- cacheAccess BooleanToken Introspection 
- Whether to cache access token introspection results.
- cacheChannel BooleanToken Introspection 
- Whether to cache channel token introspection results.
- channelToken List<String>Consumer Bies 
- When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id,username, andcustom_id.
- channelToken List<String>Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, ausername, and acustom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with403 Forbidden.
- String
- When using opaquechannel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns401 Unauthorizedwhen using opaque channel tokens.
- channelToken StringIntrospection Body Args 
- If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource=ora=1&b=&c.
- channelToken List<String>Introspection Consumer Bies 
- When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id,usernameandcustom_id.
- channelToken List<String>Introspection Consumer Claims 
- When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as suborusername) in channel token introspection results to Kong consumer entity
- channelToken StringIntrospection Endpoint 
- When you use opaqueaccess tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns401 Unauthorizedinstead.
- channelToken StringIntrospection Hint 
- If you need to give hintparameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, ahintisn't sent with channel token introspection.
- channelToken List<String>Introspection Jwt Claims 
- If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
- channelToken NumberIntrospection Leeway 
- You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be added to introspection results (JSON)expclaim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspectionexpiryverification altogether withconfig.verify_channel_token_introspection_expiry.
- channelToken List<String>Introspection Scopes Claims 
- Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values ofconfig.channel_token_introspection_scopes_required. This supports nested claims.
- channelToken List<String>Introspection Scopes Requireds 
- Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
- channelToken NumberIntrospection Timeout 
- Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeouton channel token introspection.
- channelToken StringIssuer 
- The issclaim of the re-signed channel token is set to this value, which iskongby default. The originalissclaim of the incoming token (possibly introspected) is stored in theoriginal_issclaim of the newly signed channel token.
- channelToken StringJwks Uri 
- If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with401 Unauthorized.
- channelToken StringJwks Uri Client Certificate 
- The client certificate that will be used to authenticate Kong if access_token_jwks_uriis an https uri that requires mTLS Auth.
- channelToken StringJwks Uri Client Password 
- The client password that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_username
- channelToken StringJwks Uri Client Username 
- The client username that will be used to authenticate Kong if channel_token_jwks_uriis a uri that requires Basic Auth. Should be configured together withchannel_token_jwks_uri_client_password
- channelToken NumberJwks Uri Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation.
- channelToken StringKeyset 
- The name of the keyset containing signing keys.
- channelToken StringKeyset Client Certificate 
- The client certificate that will be used to authenticate Kong if channel_token_keysetis an https uri that requires mTLS Auth.
- channelToken StringKeyset Client Password 
- The client password that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_username
- channelToken StringKeyset Client Username 
- The client username that will be used to authenticate Kong if channel_token_keysetis a uri that requires Basic Auth. Should be configured together withchannel_token_keyset_client_password
- channelToken NumberKeyset Rotate Period 
- Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation.
- channelToken NumberLeeway 
- Adjusts clock skew between the token issuer and Kong. The value will be added to token's expclaim before checking token expiry against Kong servers current time in seconds. You can disable channel tokenexpiryverification altogether withconfig.verify_channel_token_expiry.
- channelToken BooleanOptional 
- If a channel token is not provided or no config.channel_token_request_headeris specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with401 Unauthorized(client didn't send a token) or500 Unexpected(a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect
- channelToken StringRequest Header 
- This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to nullor""(empty string).
- channelToken List<String>Scopes Claims 
- Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims.
- channelToken List<String>Scopes Requireds 
- Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
- channelToken StringSigning Algorithm 
- When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token.
- channelToken StringUpstream Header 
- This plugin removes the config.channel_token_request_headerfrom the request after reading its value.
- channelToken NumberUpstream Leeway 
- If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's expclaim.
- enableAccess BooleanToken Introspection 
- If you don't want to support opaque access tokens, change this configuration parameter to falseto disable introspection.
- enableChannel BooleanToken Introspection 
- If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false.
- enableHs BooleanSignatures 
- Tokens signed with HMAC algorithms such as HS256,HS384, orHS512are not accepted by default. If you need to accept such tokens for verification, enable this setting.
- enableInstrumentation Boolean
- Writes log entries with some added information using ngx.CRIT(CRITICAL) level.
- originalAccess StringToken Upstream Header 
- The HTTP header name used to store the original access token.
- originalChannel StringToken Upstream Header 
- The HTTP header name used to store the original channel token.
- realm String
- When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticateheader with therealmattribute value.
- removeAccess List<String>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- removeChannel List<String>Token Claims 
- remove claims. It should be an array, and each element is a claim key string.
- setAccess Map<String>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setChannel Map<String>Token Claims 
- Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- setClaims Map<String>
- Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
- trustAccess BooleanToken Introspection 
- Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload.
- trustChannel BooleanToken Introspection 
- Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channel_token_introspection_jwt_claim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked.
- verifyAccess BooleanToken Expiry 
- Quickly turn access token expiry verification off and on as needed.
- verifyAccess BooleanToken Introspection Expiry 
- Quickly turn access token introspection expiry verification off and on as needed.
- verifyAccess BooleanToken Introspection Scopes 
- Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required.
- verifyAccess BooleanToken Scopes 
- Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required.
- verifyAccess BooleanToken Signature 
- Quickly turn access token signature verification off and on as needed.
- verifyChannel BooleanToken Expiry 
- verifyChannel BooleanToken Introspection Expiry 
- Quickly turn on/off the channel token introspection expiry verification.
- verifyChannel BooleanToken Introspection Scopes 
- Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required.
- verifyChannel BooleanToken Scopes 
- Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required.
- verifyChannel BooleanToken Signature 
- Quickly turn on/off the channel token signature verification.
GetGatewayPluginJwtSignerOrdering     
GetGatewayPluginJwtSignerOrderingAfter      
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginJwtSignerOrderingBefore      
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginJwtSignerRoute     
- Id string
- Id string
- id String
- id string
- id str
- id String
GetGatewayPluginJwtSignerService     
- Id string
- Id string
- id String
- id string
- id str
- id String
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the konnectTerraform Provider.