A JWT auth role defines claim constraints and token settings for entities authenticating via a jwt-auth configuration.
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
Created
Bad Request
Unauthorized
Forbidden
Not Found
Conflict (instance exists)
Service Unavailable (strongbox sealed)
name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| validate | string <enumeration> Validate the request but do not actually perform the requested operation |
| keys | string <enumeration> Retrieve only the keys for the list |
| count | string <enumeration> Retrieve only the number of elements in the list |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
- name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
No Content
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
No Content
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
Created
No Content
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
OK
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all
Created
Bad Request
Unauthorized
Forbidden
Not Found
Conflict (instance exists)
Service Unavailable (strongbox sealed)
name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| validate | string <enumeration> Validate the request but do not actually perform the requested operation |
| keys | string <enumeration> Retrieve only the keys for the list |
| count | string <enumeration> Retrieve only the number of elements in the list |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
- name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
No Content
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
Created
No Content
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
OK
Bad Request
Unauthorized
Forbidden
Not Found
Precondition Failed
Service Unavailable (strongbox sealed)
name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| site | string Send the request to the specfifed site |
| content | string <enumeration> Filter descendant nodes in the response |
| keys | string <enumeration> Retrieve only the keys for the list |
| count | string <enumeration> Retrieve only the number of elements in the list |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
- name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all distribution-status: to: all
JWT authentication configurations. Each entry defines a trusted JWT issuer and the rules for mapping JWT claims to token policies.
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| site | string Send the request to the specfifed site |
| content | string <enumeration> Filter descendant nodes in the response |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
name: example discovery-url: https://idp.example.test:8443 jwks-ca-cert: | -----BEGIN CERTIFICATE----- MIIB...REPLACE_ME...== -----END CERTIFICATE----- jwks-use-root-ca-certs: false jwks-server-name-indication: idp.example.test jwks-tls-verify: true jwks-refresh-interval: 5m jwks-request-timeout: 5s jwks-cache-max-age: 1h allowed-algorithms: - es256 allowed-clock-skew: 1m require-exp: true issuer: https://idp.example.test:8443 verbose-logging: false distribute: to: all distribution-status: to: all
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| site | string Send the request to the specfifed site |
| content | string <enumeration> Filter descendant nodes in the response |
| keys | string <enumeration> Retrieve only the keys for the list |
| count | string <enumeration> Retrieve only the number of elements in the list |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
- name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false
| fields | string Retrieve only requested fields from the resource See section fields |
| where | string Retrieve only items matching the given expression. See section where |
| site | string Send the request to the specfifed site |
| content | string <enumeration> Filter descendant nodes in the response |
OK
Bad Request
Unauthorized
Forbidden
Not Found
Service Unavailable (strongbox sealed)
name: default bound-audiences: - myapp user-claim: sub bound-subject: user@example.com bound-claims: env: production required-claims: - email claim-mappings: email: email sub: username policies-claim: policies verbose-logging: false token-ttl: 1d token-max-ttl: 30d token-policies: - user token-auto-bound-cidrs: host token-bound-cidrs: - 192.168.1.0/24 token-explicit-max-ttl: 0s token-no-default-policy: false token-num-uses: 0 token-period: 0s token-type: default token-renewable: true token-spiffe-jwt: jwt-audiences: - popcorn token-spiffe-x509: cert-type: client server-ext-usage: false client-ext-usage: true code-signing-ext-usage: false full-authority-key-identifier: false