If the JWT includes a nbf claim, this variable will contain the value. The Date the token was issued, expressed in seconds since epoch. The expiration date/time, expressed in seconds since epoch. This value may be a string, or an array of strings. The subject specified in the JWT to this context variable: Upon success, the Verify JWT and Decode JWT policies setĬontext variables according to this pattern:įor example, if the policy name is jwt-parse-token, then the policy will store (See the note above for important information If the variable does not exist or if the policy otherwise can't find the JWT, the You can configure to policy to retrieve the JWT from a form or query parameter variable or any For example, you would pass the JWT in the Include the Source element in the policy however, you must includeīearer in the auth header. If you pass the JWT in the Authorization header, you do not need to In this case, Edge looks for the JWT in the Note: By default, the JWT is retrieved from the variable If present, specifies the flow variable in which the policy expects to find the JWT toĭecode. If you omit this element, the value of the policy's name attribute is used. Use in addition to the name attribute to label the policy in the management UI proxy editor Set to true to have flow execution continue even after a policy Set to false to return an error when a policy fails. Label the policy in the management UI proxy editor with a different, natural-language Restrictions, such as automatically removing characters that are not alphanumeric. However, the Edge management UI enforces additional Characters you can use in the name are restricted to:Ī-Z0-9._\-$ %. ![]() The following attributes are common to all policy parent elements. The policy reference describes the elements and attributes of the Decode JWT policy. List of the variables set by this policy. ![]() ![]() In the API proxy can examine those values. The policy writes its output to context variables so that subsequent policies or conditions Variable must be present and contain a viable (decodable) JWT. The policy shown below decodes a JWT found in the flow variable var.jwt.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |