Skip to main content

Middleware Configuration

Plugin Config Block

NameRequiredTypeDefaultDescription
SecretnostringMLFs4TT99kOOq8h3UAVRtYoCTDYXiRcZA secret used for encryption. Must be a 32 character string. It is strongly suggested to change this.
ProvideryesProvidernoneIdentity Provider Configuration. See Provider block.
Scopesnostring[]["openid", "profile", "email"]A list of scopes to request from the IDP.
CallbackUrinostring/oidc/callbackDefines the callback url used by the IDP. This needs to be registered in your IDP.
LoginUrinostringnoneAn optional url, which should trigger the login-flow. By default every url triggers a login-flow, if the user is not already logged in. If you set this to eg. /login, only this url will trigger a login-flow while all other requests return Unauthorized.
PostLoginRedirectUrinostringnoneAn optional static redirect url where the user should be redirected after login. By default the user will be redirected to the url which triggered the login-flow.
LogoutUrinostring/logoutThe url which should trigger a logout-flow.
PostLogoutRedirectUrinostring/The url where the user should be redirected after logout.
AuthorizationnoAuthorizationnoneAuthorization Configuration. See Authorization block.
HeadersnoHeadersnoneHeader Configuration. See Headers block.

Provider Block

NameRequiredTypeDefaultDescription
UrlnostringnoneThe full URL of the Identity Provider. This is required, if UrlEnv is not used.
UrlEnvnostringnoneThe name of an environment variable, containing the full URL of the Identity Provider. This is required, if Url is not used.
ClientIdnostringnoneThe client id of the application. This is required, if ClientIdEnv is not used.
ClientIdEnvnostringnoneThe name of an environment variable, containing the client id. This is required, if ClientId is not used.
ClientSecretnostringnoneThe client secret of the application. This is required, if ClientSecretEnv is not used and UsePkce is false.
ClientSecretEnvnostringnoneThe name of an environment variable, containing the client secret. This is required, if ClientSecret and UsePkce are not used.
UsePkcenoboolfalseEnable PKCE. In this case, a client secret is not needed. The following algorithms are supported: RS, EC, ES.
ValidateIssuernobooltrueSpecifies whether the iss claim in the JWT-token should be validated.
ValidIssuernostringdiscovery documentThe issuer which must be present in the JWT-token. By default this will be read from the OIDC discovery document.
ValidIssuerEnvnostringnoneThe name of an environment variable, containing the valid issuer. This is required, if ValidIssuer is not used and ValidateIssuer is enabled.
ValidateAudiencenobooltrueSpecifies whether the aud claim in the JWT-token should be validated.
ValidAudiencenostringClientIdThe audience which must be present in the JWT-token. Defaults to the configured client id.
ValidAudienceEnvnostringnoneThe name of an environment variable, containing the valid audience. This is required, if ValidAudience is not used and ValidateAudience is enabled.
TokenValidationnostringAccessTokenSpecifies which token or method should be used to validate the authentication cookie. Can be either AccessToken, IdToken or Introspection. When using Microsoft EntraID, this will automatically default to IdToken. Introspection may not work when using PKCE.

Authorization Block

NameRequiredTypeDefaultDescription
AssertClaimsnoClaimAssertion[]noneClaimAssertion Configuration. See ClaimAssertion block.

ClaimAssertion Block

If only the Name property is set and no additional assertions are defined it is only checked whether there exist any matches for the name of this claim without any verification on their values. Additionaly, the Name field can be any json path. The Name gets prefixed with $. to match from the root element. The usage of json paths allows for assertions on deeply nested json structures.

NameRequiredTypeDefaultDescription
NameyesstringnoneThe name of the claim in the access token.
AnyOfnostring[]noneAn array of allowed strings. The user is authorized if any value matching the name of the claim contains (or is) a value of this array.
AllOfnostring[]noneAn array of required strings. The user is only authorized if any value matching the name of the claim contains (or is) a value of this array and all values of this array are covered in the end.

It is possible to combine AnyOf and AllOf quantifiers for one assertion

Examples

All of the examples below work on this json structure:

{
"store": {
"bicycle": {
"color": "red",
"price": 19.95
},
"book": [
{
"author": "Herman Melville",
"category": "fiction",
"isbn": "0-553-21311-3",
"price": 8.99,
"title": "Moby Dick"
},
{
"author": "J. R. R. Tolkien",
"category": "fiction",
"isbn": "0-395-19395-8",
"price": 22.99,
"title": "The Lord of the Rings"
}
],
}
}

Example: Expect array to contain a set of values

Name: store.book[*].price
AllOf: [ 22.99, 8.99 ]

This assertion would succeed as the book array contains all values specified by the AllOf quantifier

Name: store.book[*].price
AllOf: [ 22.99, 8.99, 1 ]

This assertion would fail as the book array contains no entry for which the price is 1

Example: Expect object key to be any value of a set of values

Name: store.bicycle.color
AnyOf: [ "red", "blue", "green" ]

This assertion would succeed as the store object contains a bicycle object whose color is red

Headers Block

NameRequiredTypeDefaultDescription
MapClaimsnoClaimHeader[]noneA list of claims which should be mapped as headers when the request will be sent to the upstream. See ClaimHeader block.

ClaimHeader Block

NameRequiredTypeDefaultDescription
ClaimyesstringnoneThe name of the claim
HeaderyesstringnoneThe name of the header which should receive the claim value.