You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`auth_jwt_key`| The key to use to decode/verify the JWT, *in binhex format* -- see below. |
20
-
|`auth_jwt_redirect`| Set to "on" to redirect to `auth_jwt_loginurl` if authentication fails. |
21
-
|`auth_jwt_loginurl`| The URL to redirect to if `auth_jwt_redirect` is enabled and authentication fails. |
22
-
|`auth_jwt_enabled`| Set to "on" to enable JWT checking. |
23
-
|`auth_jwt_algorithm`| The algorithm to use. One of: HS256, HS384, HS512, RS256, RS384, RS512 |
24
-
|`auth_jwt_location`| Indicates where the JWT is located in the request -- see below. |
25
-
|`auth_jwt_validate_sub`| Set to "on" to validate the `sub` claim (e.g. user id) in the JWT. |
26
-
|`auth_jwt_extract_request_claims`| Set to a space-delimited list of claims to extract from the JWT and set as request headers. These will be accessible via e.g: `$http_jwt_sub`|
27
-
|`auth_jwt_extract_response_claims`| Set to a space-delimited list of claims to extract from the JWT and set as response headers. These will be accessible via e.g: `$sent_http_jwt_sub`|
28
-
|`auth_jwt_use_keyfile`| Set to "on" to read the key from a file rather than from the `auth_jwt_key` directive. |
29
-
|`auth_jwt_keyfile_path`| Set to the path from which the key should be read when `auth_jwt_use_keyfile` is enabled. |
|`auth_jwt_key`| The key to use to decode/verify the JWT, *in binhex format* -- see below. |
20
+
|`auth_jwt_redirect`| Set to "on" to redirect to `auth_jwt_loginurl` if authentication fails. |
21
+
|`auth_jwt_loginurl`| The URL to redirect to if `auth_jwt_redirect` is enabled and authentication fails. |
22
+
|`auth_jwt_enabled`| Set to "on" to enable JWT checking. |
23
+
|`auth_jwt_algorithm`| The algorithm to use. One of: HS256, HS384, HS512, RS256, RS384, RS512 |
24
+
|`auth_jwt_location`| Indicates where the JWT is located in the request -- see below. |
25
+
|`auth_jwt_validate_sub`| Set to "on" to validate the `sub` claim (e.g. user id) in the JWT. |
26
+
|`auth_jwt_extract_var_claims`| Set to a space-delimited list of claims to extract from the JWT and make available as NGINX variables. These will be accessible via e.g: `$jwt_claim_sub`|
27
+
|`auth_jwt_extract_request_claims`| Set to a space-delimited list of claims to extract from the JWT and set as request headers. These will be accessible via e.g: `$http_jwt_sub`|
28
+
|`auth_jwt_extract_response_claims`| Set to a space-delimited list of claims to extract from the JWT and set as response headers. These will be accessible via e.g: `$sent_http_jwt_sub`|
29
+
|`auth_jwt_use_keyfile`| Set to "on" to read the key from a file rather than from the `auth_jwt_key` directive. |
30
+
|`auth_jwt_keyfile_path`| Set to the path from which the key should be read when `auth_jwt_use_keyfile` is enabled. |
30
31
31
32
32
33
## Algorithms
@@ -92,19 +93,19 @@ auth_jwt_validate_sub on;
92
93
93
94
You may specify claims to be extracted from the JWT and placed on the request and/or response headers. This is especially handly because the claims will then also be available as NGINX variables.
94
95
95
-
If you only wish to access a claim as an NGINX variable, you should use `auth_jwt_extract_request_claims` so that the claim does not end up being sent to the client as a response header. However, if you do want the claim to be sent to the client in the response, then use `auth_jwt_extract_response_claims` instead.
96
+
If you only wish to access a claim as an NGINX variable, you should use `auth_jwt_extract_var_claims` so that the claim does not end up being sent to the client as a response header. However, if you do want the claim to be sent to the client in the response, you may use `auth_jwt_extract_response_claims` instead.
96
97
97
98
_Please note that `number`, `boolean`, `array`, and `object` claims are not supported at this time -- only `string` claims are supported._ An error will be thrown if you attempt to extract a non-string claim.
98
99
99
-
### Using Request Claims
100
+
### Using Claims
100
101
101
102
For example, you could configure an NGINX location which redirects to the current user's profile. Suppose `sub=abc-123`, the configuration below would redirect to `/profile/abc-123`.
0 commit comments