Authorization

By default, the federated graph is publicly available. It is up to subgraphs to check whether a user has the proper credentials. Alternatively, a federated graph can also validate whether users have proper credentials before the request execution through a authorization provider. Multiple authorization providers can be configured, only one needs to authorize the user.

JWT authorization can be configured as follows:

[authentication.providers.jwt.jwks] url = "https://example.com/.well-known/jwks.json"

We follow the JWT (RFC 7519) specification for JWT validation and validate its signature with the JWKs (RFC 7517) provided at jwks.url. The validation consists of the following steps:

  1. The signature of the JWT must be valid with one of the specified JWK.
  2. if the exp claim is present, it must be in the future with a leeway of 60s.
  3. if the nbf claim is present, it must be in the past with a leeway of 60s.
  4. if the iss claim is present and issuer is specified, they must match.
  5. if the aud claim is present and the audience is specified, they must match. If aud is an array audience must be part of it.

While not required, it is strongly recommended to at least specify the audience (aud claim). Otherwise JWTs which weren't meant for your project would still be accepted.

Here is the full configuration with optional fields:

[authentication.providers.jwt] name = "my-authenticator" [authentication.providers.jwt.jwks] url = "https://example.com/.well-known/jwks.json" issuer = "example.com" audience = "my-project" poll_interval = 60 [authentication.providers.jwt.header] name = "Authorization" value_prefix = "Bearer "

The poll_internal value defines how often the JWKs will be refreshed. It is best left to its default value.