Get desktop application:
View/edit binary Protocol Buffers messages
OAuth cookie configuration attributes.
Used in:
The value used for the SameSite cookie attribute.
Used in:
[#next-free-field: 8]
Used in:
Configuration for the bearer token cookie.
Configuration for the OAuth HMAC cookie.
Configuration for the OAuth expires cookie.
Configuration for the ID token cookie.
Configuration for the refresh token cookie.
Configuration for the OAuth nonce cookie.
Configuration for the code verifier cookie.
Filter config.
Leave this empty to disable OAuth2 for a specific route, using per filter config.
OAuth config [#next-free-field: 23]
Used in:
Endpoint on the authorization server to retrieve the access token from.
Specifies the retry policy for requests to the OAuth server. If not specified, then no retries will be performed.
The endpoint redirect to for authorization in response to unauthorized requests.
Credentials used for OAuth.
The redirect URI passed to the authorization endpoint. Supports header formatting tokens. For more information, including details on header value syntax, see the documentation on :ref:`custom request headers <config_http_conn_man_headers_custom_request_headers>`. This URI should not contain any query parameters.
Matching criteria used to determine whether a path appears to be the result of a redirect from the authorization server.
The path to sign a user out, clearing their credential cookies.
Forward the OAuth token as a Bearer to upstream web service.
If set to true, preserve the existing authorization header. By default the client strips the existing authorization header before forwarding upstream. Can not be set to true if forward_bearer_token is already set to true. Default value is false.
Any request that matches any of the provided matchers will be passed through without OAuth validation.
Optional list of OAuth scopes to be claimed in the authorization request. If not specified, defaults to "user" scope. OAuth RFC https://tools.ietf.org/html/rfc6749#section-3.3
Optional resource parameter for authorization request RFC: https://tools.ietf.org/html/rfc8707
Defines how ``client_id`` and ``client_secret`` are sent in OAuth client to OAuth server requests. RFC https://datatracker.ietf.org/doc/html/rfc6749#section-2.3.1
If set to true, allows automatic access token refresh using the associated refresh token (see `RFC 6749 section 6 <https://datatracker.ietf.org/doc/html/rfc6749#section-6>`_), provided that the OAuth server supports that. Default value is true.
The default lifetime in seconds of the access token, if omitted by the authorization server. If this value is not set, it will default to ``0s``. In this case, the expiry must be set by the authorization server or the OAuth flow will fail.
Any request that matches any of the provided matchers won't be redirected to OAuth server when tokens are not valid. Automatic access token refresh will be performed for these requests, if enabled. This behavior can be useful for AJAX requests.
The default lifetime in seconds of the refresh token, if the exp (expiration time) claim is omitted in the refresh token or the refresh token is not JWT. If this value is not set, it will default to ``604800s``. In this case, the cookie with the refresh token will be expired in a week. This setting is only considered if ``use_refresh_token`` is set to true, otherwise the authorization server expiration or ``default_expires_in`` is used.
If set to true, the client will not set a cookie for ID Token even if one is received from the Identity Provider. This may be useful in cases where the ID Token is too large for HTTP cookies (longer than 4096 characters). Enabling this option will only disable setting the cookie response header, the filter will still process incoming ID Tokens as part of the HMAC if they are there. This is to ensure compatibility while switching this setting on. Future sessions would not set the IdToken cookie header.
If set to true, the client will not set a cookie for Access Token even if one is received from the Identity Provider. Enabling this option will only disable setting the cookie response header, the filter will still process incoming Access Tokens as part of the HMAC if they are there. This is to ensure compatibility while switching this setting on. Future sessions would not set the Access Token cookie header.
If set to true, the client will not set a cookie for Refresh Token even if one is received from the Identity Provider. Enabling this option will only disable setting the cookie response header, the filter will still process incoming Refresh Tokens as part of the HMAC if they are there. This is to ensure compatibility while switching this setting on. Future sessions would not set the Refresh Token cookie header.
Controls for attributes that can be set on the cookies.
Optional additional prefix to use when emitting statistics.
Used in:
The ``client_id`` and ``client_secret`` will be sent in the URL encoded request body. This type should only be used when Auth server does not support Basic authentication.
The ``client_id`` and ``client_secret`` will be sent using HTTP Basic authentication scheme.
[#next-free-field: 6]
Used in:
The client_id to be used in the authorize calls. This value will be URL encoded when sent to the OAuth server.
The secret used to retrieve the access token. This value will be URL encoded when sent to the OAuth server.
Configures how the secret token should be created.
If present, the secret token will be a HMAC using the provided secret.
The cookie names used in OAuth filters flow.
The domain to set the cookie on. If not set, the cookie will default to the host of the request, not including the subdomains. This is useful when token cookies need to be shared across multiple subdomains.
[#next-free-field: 8]
Used in:
Cookie name to hold OAuth bearer token value. When the authentication server validates the client and returns an authorization token back to the OAuth filter, no matter what format that token is, if :ref:`forward_bearer_token <envoy_v3_api_field_extensions.filters.http.oauth2.v3.OAuth2Config.forward_bearer_token>` is set to true the filter will send over the bearer token as a cookie with this name to the upstream. Defaults to ``BearerToken``.
Cookie name to hold OAuth HMAC value. Defaults to ``OauthHMAC``.
Cookie name to hold OAuth expiry value. Defaults to ``OauthExpires``.
Cookie name to hold the id token. Defaults to ``IdToken``.
Cookie name to hold the refresh token. Defaults to ``RefreshToken``.
Cookie name to hold the nonce value. Defaults to ``OauthNonce``.
Cookie name to hold the PKCE code verifier. Defaults to ``OauthCodeVerifier``.