Validate JWT in your application server
Authenticate the incoming HTTP requests by validating JWT in your application server
Last updated
Was this helpful?
Authenticate the incoming HTTP requests by validating JWT in your application server
Last updated
Was this helpful?
In this section, we will go through how to decode the JWT token to obtain the currently logged-in user.
Before we start, make sure the option Issue JWT as access token is enabled in your Application settings in the Portal.
This Discovery endpoint serves a JSON document containing the OpenID Connect configuration of your app. It includes the authorization endpoint, the token endpoint and the JWKS endpoint.
https://<YOUR_AUTHGEAR_ENDPOINT>/.well-known/openid-configuration
Here is an example of how it looks.
The JSON Web Key Sets (JWKS) endpoint can be found in jwk_url
in the configuration.
OpenID Connect Configuration JSON
Follow this step-by-step example to verify and decode the JWT token.
Define a function to find the JWKS endpoint from the OpenID Connect configuration. Use your Authgear endpoint as base_address
Define a function to extract the access token from the Authorization header in the incoming request. It should look like Authorization: Bearer <access_token>
.
Here show an example of using Flask web framework to guard a path. You may need to adjust some of the codes to suit your technologies.
Validating JWT in your application server is currently only available for Token-based authentication.
For Cookie-based authentication, JWT in cookies is not supported yet. You can track the issue here.