1. Packages
  2. Konnect Provider
  3. API Docs
  4. GatewayPluginJwtSigner
konnect 3.4.1 published on Wednesday, Oct 29, 2025 by kong

konnect.GatewayPluginJwtSigner

Start a Neo task
Explain and create a konnect.GatewayPluginJwtSigner resource
konnect logo
konnect 3.4.1 published on Wednesday, Oct 29, 2025 by kong

    GatewayPluginJwtSigner Resource

    Example Usage

    Example coming soon!
    
    Example coming soon!
    
    Example coming soon!
    
    Example coming soon!
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.konnect.GatewayPluginJwtSigner;
    import com.pulumi.konnect.GatewayPluginJwtSignerArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerConfigArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerOrderingArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerOrderingAfterArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerOrderingBeforeArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerPartialArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerRouteArgs;
    import com.pulumi.konnect.inputs.GatewayPluginJwtSignerServiceArgs;
    import static com.pulumi.codegen.internal.Serialization.*;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myGatewaypluginjwtsigner = new GatewayPluginJwtSigner("myGatewaypluginjwtsigner", GatewayPluginJwtSignerArgs.builder()
                .config(GatewayPluginJwtSignerConfigArgs.builder()
                    .access_token_audience_claim("...")
                    .access_token_audiences_allowed("...")
                    .access_token_consumer_by("custom_id")
                    .access_token_consumer_claim("...")
                    .access_token_expiry_claim("...")
                    .access_token_introspection_audience_claim("...")
                    .access_token_introspection_audiences_allowed("...")
                    .access_token_introspection_authorization("...my_access_token_introspection_authorization...")
                    .access_token_introspection_body_args("...my_access_token_introspection_body_args...")
                    .access_token_introspection_consumer_by("custom_id")
                    .access_token_introspection_consumer_claim("...")
                    .access_token_introspection_endpoint("...my_access_token_introspection_endpoint...")
                    .access_token_introspection_expiry_claim("...")
                    .access_token_introspection_hint("...my_access_token_introspection_hint...")
                    .access_token_introspection_issuer_claim("...")
                    .access_token_introspection_issuers_allowed("...")
                    .access_token_introspection_jwt_claim("...")
                    .access_token_introspection_leeway(6.18)
                    .access_token_introspection_notbefore_claim("...")
                    .access_token_introspection_optional_claims()
                    .access_token_introspection_required_claims()
                    .access_token_introspection_scopes_claim("...")
                    .access_token_introspection_scopes_required("...")
                    .access_token_introspection_subject_claim("...")
                    .access_token_introspection_subjects_allowed("...")
                    .access_token_introspection_timeout(4.24)
                    .access_token_issuer("...my_access_token_issuer...")
                    .access_token_issuer_claim("...")
                    .access_token_issuers_allowed("...")
                    .access_token_jwks_uri("...my_access_token_jwks_uri...")
                    .access_token_jwks_uri_client_certificate(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .access_token_jwks_uri_client_password("...my_access_token_jwks_uri_client_password...")
                    .access_token_jwks_uri_client_username("...my_access_token_jwks_uri_client_username...")
                    .access_token_jwks_uri_rotate_period(0.18)
                    .access_token_keyset("...my_access_token_keyset...")
                    .access_token_keyset_client_certificate(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .access_token_keyset_client_password("...my_access_token_keyset_client_password...")
                    .access_token_keyset_client_username("...my_access_token_keyset_client_username...")
                    .access_token_keyset_rotate_period(4.53)
                    .access_token_leeway(0.51)
                    .access_token_notbefore_claim("...")
                    .access_token_optional(false)
                    .access_token_optional_claims()
                    .access_token_request_header("...my_access_token_request_header...")
                    .access_token_required_claims()
                    .access_token_scopes_claim("...")
                    .access_token_scopes_required("...")
                    .access_token_signing(true)
                    .access_token_signing_algorithm("PS384")
                    .access_token_subject_claim("...")
                    .access_token_subjects_allowed("...")
                    .access_token_upstream_header("...my_access_token_upstream_header...")
                    .access_token_upstream_leeway(1.88)
                    .add_access_token_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .add_channel_token_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .add_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .cache_access_token_introspection(false)
                    .cache_channel_token_introspection(true)
                    .channel_token_audience_claim("...")
                    .channel_token_audiences_allowed("...")
                    .channel_token_consumer_by("id")
                    .channel_token_consumer_claim("...")
                    .channel_token_expiry_claim("...")
                    .channel_token_introspection_audience_claim("...")
                    .channel_token_introspection_audiences_allowed("...")
                    .channel_token_introspection_authorization("...my_channel_token_introspection_authorization...")
                    .channel_token_introspection_body_args("...my_channel_token_introspection_body_args...")
                    .channel_token_introspection_consumer_by("custom_id")
                    .channel_token_introspection_consumer_claim("...")
                    .channel_token_introspection_endpoint("...my_channel_token_introspection_endpoint...")
                    .channel_token_introspection_expiry_claim("...")
                    .channel_token_introspection_hint("...my_channel_token_introspection_hint...")
                    .channel_token_introspection_issuer_claim("...")
                    .channel_token_introspection_issuers_allowed("...")
                    .channel_token_introspection_jwt_claim("...")
                    .channel_token_introspection_leeway(4.31)
                    .channel_token_introspection_notbefore_claim("...")
                    .channel_token_introspection_optional_claims()
                    .channel_token_introspection_required_claims()
                    .channel_token_introspection_scopes_claim("...")
                    .channel_token_introspection_scopes_required("...")
                    .channel_token_introspection_subject_claim("...")
                    .channel_token_introspection_subjects_allowed("...")
                    .channel_token_introspection_timeout(6.9)
                    .channel_token_issuer("...my_channel_token_issuer...")
                    .channel_token_issuer_claim("...")
                    .channel_token_issuers_allowed("...")
                    .channel_token_jwks_uri("...my_channel_token_jwks_uri...")
                    .channel_token_jwks_uri_client_certificate(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .channel_token_jwks_uri_client_password("...my_channel_token_jwks_uri_client_password...")
                    .channel_token_jwks_uri_client_username("...my_channel_token_jwks_uri_client_username...")
                    .channel_token_jwks_uri_rotate_period(9.27)
                    .channel_token_keyset("...my_channel_token_keyset...")
                    .channel_token_keyset_client_certificate(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .channel_token_keyset_client_password("...my_channel_token_keyset_client_password...")
                    .channel_token_keyset_client_username("...my_channel_token_keyset_client_username...")
                    .channel_token_keyset_rotate_period(0.98)
                    .channel_token_leeway(4.86)
                    .channel_token_notbefore_claim("...")
                    .channel_token_optional(false)
                    .channel_token_optional_claims()
                    .channel_token_request_header("...my_channel_token_request_header...")
                    .channel_token_required_claims()
                    .channel_token_scopes_claim("...")
                    .channel_token_scopes_required("...")
                    .channel_token_signing(false)
                    .channel_token_signing_algorithm("PS512")
                    .channel_token_subject_claim("...")
                    .channel_token_subjects_allowed("...")
                    .channel_token_upstream_header("...my_channel_token_upstream_header...")
                    .channel_token_upstream_leeway(5.01)
                    .enable_access_token_introspection(false)
                    .enable_channel_token_introspection(true)
                    .enable_hs_signatures(false)
                    .enable_instrumentation(true)
                    .original_access_token_upstream_header("...my_original_access_token_upstream_header...")
                    .original_channel_token_upstream_header("...my_original_channel_token_upstream_header...")
                    .realm("...my_realm...")
                    .remove_access_token_claims("...")
                    .remove_channel_token_claims("...")
                    .set_access_token_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .set_channel_token_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .set_claims(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .trust_access_token_introspection(true)
                    .trust_channel_token_introspection(false)
                    .verify_access_token_audience(true)
                    .verify_access_token_expiry(true)
                    .verify_access_token_introspection_audience(true)
                    .verify_access_token_introspection_expiry(false)
                    .verify_access_token_introspection_issuer(true)
                    .verify_access_token_introspection_notbefore(true)
                    .verify_access_token_introspection_scopes(false)
                    .verify_access_token_introspection_subject(false)
                    .verify_access_token_issuer(true)
                    .verify_access_token_notbefore(true)
                    .verify_access_token_scopes(false)
                    .verify_access_token_signature(true)
                    .verify_access_token_subject(false)
                    .verify_channel_token_audience(true)
                    .verify_channel_token_expiry(false)
                    .verify_channel_token_introspection_audience(false)
                    .verify_channel_token_introspection_expiry(false)
                    .verify_channel_token_introspection_issuer(true)
                    .verify_channel_token_introspection_notbefore(false)
                    .verify_channel_token_introspection_scopes(true)
                    .verify_channel_token_introspection_subject(false)
                    .verify_channel_token_issuer(true)
                    .verify_channel_token_notbefore(true)
                    .verify_channel_token_scopes(false)
                    .verify_channel_token_signature(false)
                    .verify_channel_token_subject(true)
                    .build())
                .controlPlaneId("9524ec7d-36d9-465d-a8c5-83a3c9390458")
                .createdAt(8)
                .enabled(false)
                .gatewayPluginJwtSignerId("...my_id...")
                .instanceName("...my_instance_name...")
                .ordering(GatewayPluginJwtSignerOrderingArgs.builder()
                    .after(GatewayPluginJwtSignerOrderingAfterArgs.builder()
                        .access("...")
                        .build())
                    .before(GatewayPluginJwtSignerOrderingBeforeArgs.builder()
                        .access("...")
                        .build())
                    .build())
                .partials(GatewayPluginJwtSignerPartialArgs.builder()
                    .id("...my_id...")
                    .name("...my_name...")
                    .path("...my_path...")
                    .build())
                .protocols("https")
                .route(GatewayPluginJwtSignerRouteArgs.builder()
                    .id("...my_id...")
                    .build())
                .service(GatewayPluginJwtSignerServiceArgs.builder()
                    .id("...my_id...")
                    .build())
                .tags("...")
                .updatedAt(5)
                .build());
    
        }
    }
    
    resources:
      myGatewaypluginjwtsigner:
        type: konnect:GatewayPluginJwtSigner
        properties:
          config:
            access_token_audience_claim:
              - '...'
            access_token_audiences_allowed:
              - '...'
            access_token_consumer_by:
              - custom_id
            access_token_consumer_claim:
              - '...'
            access_token_expiry_claim:
              - '...'
            access_token_introspection_audience_claim:
              - '...'
            access_token_introspection_audiences_allowed:
              - '...'
            access_token_introspection_authorization: '...my_access_token_introspection_authorization...'
            access_token_introspection_body_args: '...my_access_token_introspection_body_args...'
            access_token_introspection_consumer_by:
              - custom_id
            access_token_introspection_consumer_claim:
              - '...'
            access_token_introspection_endpoint: '...my_access_token_introspection_endpoint...'
            access_token_introspection_expiry_claim:
              - '...'
            access_token_introspection_hint: '...my_access_token_introspection_hint...'
            access_token_introspection_issuer_claim:
              - '...'
            access_token_introspection_issuers_allowed:
              - '...'
            access_token_introspection_jwt_claim:
              - '...'
            access_token_introspection_leeway: 6.18
            access_token_introspection_notbefore_claim:
              - '...'
            access_token_introspection_optional_claims:
              - []
            access_token_introspection_required_claims:
              - []
            access_token_introspection_scopes_claim:
              - '...'
            access_token_introspection_scopes_required:
              - '...'
            access_token_introspection_subject_claim:
              - '...'
            access_token_introspection_subjects_allowed:
              - '...'
            access_token_introspection_timeout: 4.24
            access_token_issuer: '...my_access_token_issuer...'
            access_token_issuer_claim:
              - '...'
            access_token_issuers_allowed:
              - '...'
            access_token_jwks_uri: '...my_access_token_jwks_uri...'
            access_token_jwks_uri_client_certificate:
              id: '...my_id...'
            access_token_jwks_uri_client_password: '...my_access_token_jwks_uri_client_password...'
            access_token_jwks_uri_client_username: '...my_access_token_jwks_uri_client_username...'
            access_token_jwks_uri_rotate_period: 0.18
            access_token_keyset: '...my_access_token_keyset...'
            access_token_keyset_client_certificate:
              id: '...my_id...'
            access_token_keyset_client_password: '...my_access_token_keyset_client_password...'
            access_token_keyset_client_username: '...my_access_token_keyset_client_username...'
            access_token_keyset_rotate_period: 4.53
            access_token_leeway: 0.51
            access_token_notbefore_claim:
              - '...'
            access_token_optional: false
            access_token_optional_claims:
              - []
            access_token_request_header: '...my_access_token_request_header...'
            access_token_required_claims:
              - []
            access_token_scopes_claim:
              - '...'
            access_token_scopes_required:
              - '...'
            access_token_signing: true
            access_token_signing_algorithm: PS384
            access_token_subject_claim:
              - '...'
            access_token_subjects_allowed:
              - '...'
            access_token_upstream_header: '...my_access_token_upstream_header...'
            access_token_upstream_leeway: 1.88
            add_access_token_claims:
              key:
                fn::toJSON: value
            add_channel_token_claims:
              key:
                fn::toJSON: value
            add_claims:
              key:
                fn::toJSON: value
            cache_access_token_introspection: false
            cache_channel_token_introspection: true
            channel_token_audience_claim:
              - '...'
            channel_token_audiences_allowed:
              - '...'
            channel_token_consumer_by:
              - id
            channel_token_consumer_claim:
              - '...'
            channel_token_expiry_claim:
              - '...'
            channel_token_introspection_audience_claim:
              - '...'
            channel_token_introspection_audiences_allowed:
              - '...'
            channel_token_introspection_authorization: '...my_channel_token_introspection_authorization...'
            channel_token_introspection_body_args: '...my_channel_token_introspection_body_args...'
            channel_token_introspection_consumer_by:
              - custom_id
            channel_token_introspection_consumer_claim:
              - '...'
            channel_token_introspection_endpoint: '...my_channel_token_introspection_endpoint...'
            channel_token_introspection_expiry_claim:
              - '...'
            channel_token_introspection_hint: '...my_channel_token_introspection_hint...'
            channel_token_introspection_issuer_claim:
              - '...'
            channel_token_introspection_issuers_allowed:
              - '...'
            channel_token_introspection_jwt_claim:
              - '...'
            channel_token_introspection_leeway: 4.31
            channel_token_introspection_notbefore_claim:
              - '...'
            channel_token_introspection_optional_claims:
              - []
            channel_token_introspection_required_claims:
              - []
            channel_token_introspection_scopes_claim:
              - '...'
            channel_token_introspection_scopes_required:
              - '...'
            channel_token_introspection_subject_claim:
              - '...'
            channel_token_introspection_subjects_allowed:
              - '...'
            channel_token_introspection_timeout: 6.9
            channel_token_issuer: '...my_channel_token_issuer...'
            channel_token_issuer_claim:
              - '...'
            channel_token_issuers_allowed:
              - '...'
            channel_token_jwks_uri: '...my_channel_token_jwks_uri...'
            channel_token_jwks_uri_client_certificate:
              id: '...my_id...'
            channel_token_jwks_uri_client_password: '...my_channel_token_jwks_uri_client_password...'
            channel_token_jwks_uri_client_username: '...my_channel_token_jwks_uri_client_username...'
            channel_token_jwks_uri_rotate_period: 9.27
            channel_token_keyset: '...my_channel_token_keyset...'
            channel_token_keyset_client_certificate:
              id: '...my_id...'
            channel_token_keyset_client_password: '...my_channel_token_keyset_client_password...'
            channel_token_keyset_client_username: '...my_channel_token_keyset_client_username...'
            channel_token_keyset_rotate_period: 0.98
            channel_token_leeway: 4.86
            channel_token_notbefore_claim:
              - '...'
            channel_token_optional: false
            channel_token_optional_claims:
              - []
            channel_token_request_header: '...my_channel_token_request_header...'
            channel_token_required_claims:
              - []
            channel_token_scopes_claim:
              - '...'
            channel_token_scopes_required:
              - '...'
            channel_token_signing: false
            channel_token_signing_algorithm: PS512
            channel_token_subject_claim:
              - '...'
            channel_token_subjects_allowed:
              - '...'
            channel_token_upstream_header: '...my_channel_token_upstream_header...'
            channel_token_upstream_leeway: 5.01
            enable_access_token_introspection: false
            enable_channel_token_introspection: true
            enable_hs_signatures: false
            enable_instrumentation: true
            original_access_token_upstream_header: '...my_original_access_token_upstream_header...'
            original_channel_token_upstream_header: '...my_original_channel_token_upstream_header...'
            realm: '...my_realm...'
            remove_access_token_claims:
              - '...'
            remove_channel_token_claims:
              - '...'
            set_access_token_claims:
              key:
                fn::toJSON: value
            set_channel_token_claims:
              key:
                fn::toJSON: value
            set_claims:
              key:
                fn::toJSON: value
            trust_access_token_introspection: true
            trust_channel_token_introspection: false
            verify_access_token_audience: true
            verify_access_token_expiry: true
            verify_access_token_introspection_audience: true
            verify_access_token_introspection_expiry: false
            verify_access_token_introspection_issuer: true
            verify_access_token_introspection_notbefore: true
            verify_access_token_introspection_scopes: false
            verify_access_token_introspection_subject: false
            verify_access_token_issuer: true
            verify_access_token_notbefore: true
            verify_access_token_scopes: false
            verify_access_token_signature: true
            verify_access_token_subject: false
            verify_channel_token_audience: true
            verify_channel_token_expiry: false
            verify_channel_token_introspection_audience: false
            verify_channel_token_introspection_expiry: false
            verify_channel_token_introspection_issuer: true
            verify_channel_token_introspection_notbefore: false
            verify_channel_token_introspection_scopes: true
            verify_channel_token_introspection_subject: false
            verify_channel_token_issuer: true
            verify_channel_token_notbefore: true
            verify_channel_token_scopes: false
            verify_channel_token_signature: false
            verify_channel_token_subject: true
          controlPlaneId: 9524ec7d-36d9-465d-a8c5-83a3c9390458
          createdAt: 8
          enabled: false
          gatewayPluginJwtSignerId: '...my_id...'
          instanceName: '...my_instance_name...'
          ordering:
            after:
              access:
                - '...'
            before:
              access:
                - '...'
          partials:
            - id: '...my_id...'
              name: '...my_name...'
              path: '...my_path...'
          protocols:
            - https
          route:
            id: '...my_id...'
          service:
            id: '...my_id...'
          tags:
            - '...'
          updatedAt: 5
    

    Create GatewayPluginJwtSigner Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new GatewayPluginJwtSigner(name: string, args: GatewayPluginJwtSignerArgs, opts?: CustomResourceOptions);
    @overload
    def GatewayPluginJwtSigner(resource_name: str,
                               args: GatewayPluginJwtSignerArgs,
                               opts: Optional[ResourceOptions] = None)
    
    @overload
    def GatewayPluginJwtSigner(resource_name: str,
                               opts: Optional[ResourceOptions] = None,
                               control_plane_id: Optional[str] = None,
                               ordering: Optional[GatewayPluginJwtSignerOrderingArgs] = None,
                               created_at: Optional[float] = None,
                               enabled: Optional[bool] = None,
                               gateway_plugin_jwt_signer_id: Optional[str] = None,
                               instance_name: Optional[str] = None,
                               config: Optional[GatewayPluginJwtSignerConfigArgs] = None,
                               partials: Optional[Sequence[GatewayPluginJwtSignerPartialArgs]] = None,
                               protocols: Optional[Sequence[str]] = None,
                               route: Optional[GatewayPluginJwtSignerRouteArgs] = None,
                               service: Optional[GatewayPluginJwtSignerServiceArgs] = None,
                               tags: Optional[Sequence[str]] = None,
                               updated_at: Optional[float] = None)
    func NewGatewayPluginJwtSigner(ctx *Context, name string, args GatewayPluginJwtSignerArgs, opts ...ResourceOption) (*GatewayPluginJwtSigner, error)
    public GatewayPluginJwtSigner(string name, GatewayPluginJwtSignerArgs args, CustomResourceOptions? opts = null)
    public GatewayPluginJwtSigner(String name, GatewayPluginJwtSignerArgs args)
    public GatewayPluginJwtSigner(String name, GatewayPluginJwtSignerArgs args, CustomResourceOptions options)
    
    type: konnect:GatewayPluginJwtSigner
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args GatewayPluginJwtSignerArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args GatewayPluginJwtSignerArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args GatewayPluginJwtSignerArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args GatewayPluginJwtSignerArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args GatewayPluginJwtSignerArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var gatewayPluginJwtSignerResource = new Konnect.GatewayPluginJwtSigner("gatewayPluginJwtSignerResource", new()
    {
        ControlPlaneId = "string",
        Ordering = new Konnect.Inputs.GatewayPluginJwtSignerOrderingArgs
        {
            After = new Konnect.Inputs.GatewayPluginJwtSignerOrderingAfterArgs
            {
                Accesses = new[]
                {
                    "string",
                },
            },
            Before = new Konnect.Inputs.GatewayPluginJwtSignerOrderingBeforeArgs
            {
                Accesses = new[]
                {
                    "string",
                },
            },
        },
        CreatedAt = 0,
        Enabled = false,
        GatewayPluginJwtSignerId = "string",
        InstanceName = "string",
        Config = new Konnect.Inputs.GatewayPluginJwtSignerConfigArgs
        {
            AccessTokenAudienceClaims = new[]
            {
                "string",
            },
            AccessTokenAudiencesAlloweds = new[]
            {
                "string",
            },
            AccessTokenConsumerBies = new[]
            {
                "string",
            },
            AccessTokenConsumerClaims = new[]
            {
                "string",
            },
            AccessTokenExpiryClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionAudienceClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionAudiencesAlloweds = new[]
            {
                "string",
            },
            AccessTokenIntrospectionAuthorization = "string",
            AccessTokenIntrospectionBodyArgs = "string",
            AccessTokenIntrospectionConsumerBies = new[]
            {
                "string",
            },
            AccessTokenIntrospectionConsumerClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionEndpoint = "string",
            AccessTokenIntrospectionExpiryClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionHint = "string",
            AccessTokenIntrospectionIssuerClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionIssuersAlloweds = new[]
            {
                "string",
            },
            AccessTokenIntrospectionJwtClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionLeeway = 0,
            AccessTokenIntrospectionNotbeforeClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionOptionalClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            AccessTokenIntrospectionRequiredClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            AccessTokenIntrospectionScopesClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionScopesRequireds = new[]
            {
                "string",
            },
            AccessTokenIntrospectionSubjectClaims = new[]
            {
                "string",
            },
            AccessTokenIntrospectionSubjectsAlloweds = new[]
            {
                "string",
            },
            AccessTokenIntrospectionTimeout = 0,
            AccessTokenIssuer = "string",
            AccessTokenIssuerClaims = new[]
            {
                "string",
            },
            AccessTokenIssuersAlloweds = new[]
            {
                "string",
            },
            AccessTokenJwksUri = "string",
            AccessTokenJwksUriClientCertificate = new Konnect.Inputs.GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificateArgs
            {
                Id = "string",
            },
            AccessTokenJwksUriClientPassword = "string",
            AccessTokenJwksUriClientUsername = "string",
            AccessTokenJwksUriRotatePeriod = 0,
            AccessTokenKeyset = "string",
            AccessTokenKeysetClientCertificate = new Konnect.Inputs.GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificateArgs
            {
                Id = "string",
            },
            AccessTokenKeysetClientPassword = "string",
            AccessTokenKeysetClientUsername = "string",
            AccessTokenKeysetRotatePeriod = 0,
            AccessTokenLeeway = 0,
            AccessTokenNotbeforeClaims = new[]
            {
                "string",
            },
            AccessTokenOptional = false,
            AccessTokenOptionalClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            AccessTokenRequestHeader = "string",
            AccessTokenRequiredClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            AccessTokenScopesClaims = new[]
            {
                "string",
            },
            AccessTokenScopesRequireds = new[]
            {
                "string",
            },
            AccessTokenSigning = false,
            AccessTokenSigningAlgorithm = "string",
            AccessTokenSubjectClaims = new[]
            {
                "string",
            },
            AccessTokenSubjectsAlloweds = new[]
            {
                "string",
            },
            AccessTokenUpstreamHeader = "string",
            AccessTokenUpstreamLeeway = 0,
            AddAccessTokenClaims = 
            {
                { "string", "string" },
            },
            AddChannelTokenClaims = 
            {
                { "string", "string" },
            },
            AddClaims = 
            {
                { "string", "string" },
            },
            CacheAccessTokenIntrospection = false,
            CacheChannelTokenIntrospection = false,
            ChannelTokenAudienceClaims = new[]
            {
                "string",
            },
            ChannelTokenAudiencesAlloweds = new[]
            {
                "string",
            },
            ChannelTokenConsumerBies = new[]
            {
                "string",
            },
            ChannelTokenConsumerClaims = new[]
            {
                "string",
            },
            ChannelTokenExpiryClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionAudienceClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionAudiencesAlloweds = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionAuthorization = "string",
            ChannelTokenIntrospectionBodyArgs = "string",
            ChannelTokenIntrospectionConsumerBies = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionConsumerClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionEndpoint = "string",
            ChannelTokenIntrospectionExpiryClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionHint = "string",
            ChannelTokenIntrospectionIssuerClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionIssuersAlloweds = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionJwtClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionLeeway = 0,
            ChannelTokenIntrospectionNotbeforeClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionOptionalClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            ChannelTokenIntrospectionRequiredClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            ChannelTokenIntrospectionScopesClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionScopesRequireds = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionSubjectClaims = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionSubjectsAlloweds = new[]
            {
                "string",
            },
            ChannelTokenIntrospectionTimeout = 0,
            ChannelTokenIssuer = "string",
            ChannelTokenIssuerClaims = new[]
            {
                "string",
            },
            ChannelTokenIssuersAlloweds = new[]
            {
                "string",
            },
            ChannelTokenJwksUri = "string",
            ChannelTokenJwksUriClientCertificate = new Konnect.Inputs.GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificateArgs
            {
                Id = "string",
            },
            ChannelTokenJwksUriClientPassword = "string",
            ChannelTokenJwksUriClientUsername = "string",
            ChannelTokenJwksUriRotatePeriod = 0,
            ChannelTokenKeyset = "string",
            ChannelTokenKeysetClientCertificate = new Konnect.Inputs.GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificateArgs
            {
                Id = "string",
            },
            ChannelTokenKeysetClientPassword = "string",
            ChannelTokenKeysetClientUsername = "string",
            ChannelTokenKeysetRotatePeriod = 0,
            ChannelTokenLeeway = 0,
            ChannelTokenNotbeforeClaims = new[]
            {
                "string",
            },
            ChannelTokenOptional = false,
            ChannelTokenOptionalClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            ChannelTokenRequestHeader = "string",
            ChannelTokenRequiredClaims = new[]
            {
                new[]
                {
                    "string",
                },
            },
            ChannelTokenScopesClaims = new[]
            {
                "string",
            },
            ChannelTokenScopesRequireds = new[]
            {
                "string",
            },
            ChannelTokenSigning = false,
            ChannelTokenSigningAlgorithm = "string",
            ChannelTokenSubjectClaims = new[]
            {
                "string",
            },
            ChannelTokenSubjectsAlloweds = new[]
            {
                "string",
            },
            ChannelTokenUpstreamHeader = "string",
            ChannelTokenUpstreamLeeway = 0,
            EnableAccessTokenIntrospection = false,
            EnableChannelTokenIntrospection = false,
            EnableHsSignatures = false,
            EnableInstrumentation = false,
            OriginalAccessTokenUpstreamHeader = "string",
            OriginalChannelTokenUpstreamHeader = "string",
            Realm = "string",
            RemoveAccessTokenClaims = new[]
            {
                "string",
            },
            RemoveChannelTokenClaims = new[]
            {
                "string",
            },
            SetAccessTokenClaims = 
            {
                { "string", "string" },
            },
            SetChannelTokenClaims = 
            {
                { "string", "string" },
            },
            SetClaims = 
            {
                { "string", "string" },
            },
            TrustAccessTokenIntrospection = false,
            TrustChannelTokenIntrospection = false,
            VerifyAccessTokenAudience = false,
            VerifyAccessTokenExpiry = false,
            VerifyAccessTokenIntrospectionAudience = false,
            VerifyAccessTokenIntrospectionExpiry = false,
            VerifyAccessTokenIntrospectionIssuer = false,
            VerifyAccessTokenIntrospectionNotbefore = false,
            VerifyAccessTokenIntrospectionScopes = false,
            VerifyAccessTokenIntrospectionSubject = false,
            VerifyAccessTokenIssuer = false,
            VerifyAccessTokenNotbefore = false,
            VerifyAccessTokenScopes = false,
            VerifyAccessTokenSignature = false,
            VerifyAccessTokenSubject = false,
            VerifyChannelTokenAudience = false,
            VerifyChannelTokenExpiry = false,
            VerifyChannelTokenIntrospectionAudience = false,
            VerifyChannelTokenIntrospectionExpiry = false,
            VerifyChannelTokenIntrospectionIssuer = false,
            VerifyChannelTokenIntrospectionNotbefore = false,
            VerifyChannelTokenIntrospectionScopes = false,
            VerifyChannelTokenIntrospectionSubject = false,
            VerifyChannelTokenIssuer = false,
            VerifyChannelTokenNotbefore = false,
            VerifyChannelTokenScopes = false,
            VerifyChannelTokenSignature = false,
            VerifyChannelTokenSubject = false,
        },
        Partials = new[]
        {
            new Konnect.Inputs.GatewayPluginJwtSignerPartialArgs
            {
                Id = "string",
                Name = "string",
                Path = "string",
            },
        },
        Protocols = new[]
        {
            "string",
        },
        Route = new Konnect.Inputs.GatewayPluginJwtSignerRouteArgs
        {
            Id = "string",
        },
        Service = new Konnect.Inputs.GatewayPluginJwtSignerServiceArgs
        {
            Id = "string",
        },
        Tags = new[]
        {
            "string",
        },
        UpdatedAt = 0,
    });
    
    example, err := konnect.NewGatewayPluginJwtSigner(ctx, "gatewayPluginJwtSignerResource", &konnect.GatewayPluginJwtSignerArgs{
    	ControlPlaneId: pulumi.String("string"),
    	Ordering: &konnect.GatewayPluginJwtSignerOrderingArgs{
    		After: &konnect.GatewayPluginJwtSignerOrderingAfterArgs{
    			Accesses: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		Before: &konnect.GatewayPluginJwtSignerOrderingBeforeArgs{
    			Accesses: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    	},
    	CreatedAt:                pulumi.Float64(0),
    	Enabled:                  pulumi.Bool(false),
    	GatewayPluginJwtSignerId: pulumi.String("string"),
    	InstanceName:             pulumi.String("string"),
    	Config: &konnect.GatewayPluginJwtSignerConfigArgs{
    		AccessTokenAudienceClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenAudiencesAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenConsumerBies: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenConsumerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenExpiryClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionAudienceClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionAudiencesAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionAuthorization: pulumi.String("string"),
    		AccessTokenIntrospectionBodyArgs:      pulumi.String("string"),
    		AccessTokenIntrospectionConsumerBies: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionConsumerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionEndpoint: pulumi.String("string"),
    		AccessTokenIntrospectionExpiryClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionHint: pulumi.String("string"),
    		AccessTokenIntrospectionIssuerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionIssuersAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionJwtClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionLeeway: pulumi.Float64(0),
    		AccessTokenIntrospectionNotbeforeClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionOptionalClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		AccessTokenIntrospectionRequiredClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		AccessTokenIntrospectionScopesClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionScopesRequireds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionSubjectClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionSubjectsAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIntrospectionTimeout: pulumi.Float64(0),
    		AccessTokenIssuer:               pulumi.String("string"),
    		AccessTokenIssuerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenIssuersAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenJwksUri: pulumi.String("string"),
    		AccessTokenJwksUriClientCertificate: &konnect.GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificateArgs{
    			Id: pulumi.String("string"),
    		},
    		AccessTokenJwksUriClientPassword: pulumi.String("string"),
    		AccessTokenJwksUriClientUsername: pulumi.String("string"),
    		AccessTokenJwksUriRotatePeriod:   pulumi.Float64(0),
    		AccessTokenKeyset:                pulumi.String("string"),
    		AccessTokenKeysetClientCertificate: &konnect.GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificateArgs{
    			Id: pulumi.String("string"),
    		},
    		AccessTokenKeysetClientPassword: pulumi.String("string"),
    		AccessTokenKeysetClientUsername: pulumi.String("string"),
    		AccessTokenKeysetRotatePeriod:   pulumi.Float64(0),
    		AccessTokenLeeway:               pulumi.Float64(0),
    		AccessTokenNotbeforeClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenOptional: pulumi.Bool(false),
    		AccessTokenOptionalClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		AccessTokenRequestHeader: pulumi.String("string"),
    		AccessTokenRequiredClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		AccessTokenScopesClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenScopesRequireds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenSigning:          pulumi.Bool(false),
    		AccessTokenSigningAlgorithm: pulumi.String("string"),
    		AccessTokenSubjectClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenSubjectsAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		AccessTokenUpstreamHeader: pulumi.String("string"),
    		AccessTokenUpstreamLeeway: pulumi.Float64(0),
    		AddAccessTokenClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		AddChannelTokenClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		AddClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		CacheAccessTokenIntrospection:  pulumi.Bool(false),
    		CacheChannelTokenIntrospection: pulumi.Bool(false),
    		ChannelTokenAudienceClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenAudiencesAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenConsumerBies: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenConsumerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenExpiryClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionAudienceClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionAudiencesAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionAuthorization: pulumi.String("string"),
    		ChannelTokenIntrospectionBodyArgs:      pulumi.String("string"),
    		ChannelTokenIntrospectionConsumerBies: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionConsumerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionEndpoint: pulumi.String("string"),
    		ChannelTokenIntrospectionExpiryClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionHint: pulumi.String("string"),
    		ChannelTokenIntrospectionIssuerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionIssuersAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionJwtClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionLeeway: pulumi.Float64(0),
    		ChannelTokenIntrospectionNotbeforeClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionOptionalClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		ChannelTokenIntrospectionRequiredClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		ChannelTokenIntrospectionScopesClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionScopesRequireds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionSubjectClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionSubjectsAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIntrospectionTimeout: pulumi.Float64(0),
    		ChannelTokenIssuer:               pulumi.String("string"),
    		ChannelTokenIssuerClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenIssuersAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenJwksUri: pulumi.String("string"),
    		ChannelTokenJwksUriClientCertificate: &konnect.GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificateArgs{
    			Id: pulumi.String("string"),
    		},
    		ChannelTokenJwksUriClientPassword: pulumi.String("string"),
    		ChannelTokenJwksUriClientUsername: pulumi.String("string"),
    		ChannelTokenJwksUriRotatePeriod:   pulumi.Float64(0),
    		ChannelTokenKeyset:                pulumi.String("string"),
    		ChannelTokenKeysetClientCertificate: &konnect.GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificateArgs{
    			Id: pulumi.String("string"),
    		},
    		ChannelTokenKeysetClientPassword: pulumi.String("string"),
    		ChannelTokenKeysetClientUsername: pulumi.String("string"),
    		ChannelTokenKeysetRotatePeriod:   pulumi.Float64(0),
    		ChannelTokenLeeway:               pulumi.Float64(0),
    		ChannelTokenNotbeforeClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenOptional: pulumi.Bool(false),
    		ChannelTokenOptionalClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		ChannelTokenRequestHeader: pulumi.String("string"),
    		ChannelTokenRequiredClaims: pulumi.StringArrayArray{
    			pulumi.StringArray{
    				pulumi.String("string"),
    			},
    		},
    		ChannelTokenScopesClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenScopesRequireds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenSigning:          pulumi.Bool(false),
    		ChannelTokenSigningAlgorithm: pulumi.String("string"),
    		ChannelTokenSubjectClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenSubjectsAlloweds: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		ChannelTokenUpstreamHeader:         pulumi.String("string"),
    		ChannelTokenUpstreamLeeway:         pulumi.Float64(0),
    		EnableAccessTokenIntrospection:     pulumi.Bool(false),
    		EnableChannelTokenIntrospection:    pulumi.Bool(false),
    		EnableHsSignatures:                 pulumi.Bool(false),
    		EnableInstrumentation:              pulumi.Bool(false),
    		OriginalAccessTokenUpstreamHeader:  pulumi.String("string"),
    		OriginalChannelTokenUpstreamHeader: pulumi.String("string"),
    		Realm:                              pulumi.String("string"),
    		RemoveAccessTokenClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		RemoveChannelTokenClaims: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		SetAccessTokenClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		SetChannelTokenClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		SetClaims: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		TrustAccessTokenIntrospection:            pulumi.Bool(false),
    		TrustChannelTokenIntrospection:           pulumi.Bool(false),
    		VerifyAccessTokenAudience:                pulumi.Bool(false),
    		VerifyAccessTokenExpiry:                  pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionAudience:   pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionExpiry:     pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionIssuer:     pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionNotbefore:  pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionScopes:     pulumi.Bool(false),
    		VerifyAccessTokenIntrospectionSubject:    pulumi.Bool(false),
    		VerifyAccessTokenIssuer:                  pulumi.Bool(false),
    		VerifyAccessTokenNotbefore:               pulumi.Bool(false),
    		VerifyAccessTokenScopes:                  pulumi.Bool(false),
    		VerifyAccessTokenSignature:               pulumi.Bool(false),
    		VerifyAccessTokenSubject:                 pulumi.Bool(false),
    		VerifyChannelTokenAudience:               pulumi.Bool(false),
    		VerifyChannelTokenExpiry:                 pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionAudience:  pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionExpiry:    pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionIssuer:    pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionNotbefore: pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionScopes:    pulumi.Bool(false),
    		VerifyChannelTokenIntrospectionSubject:   pulumi.Bool(false),
    		VerifyChannelTokenIssuer:                 pulumi.Bool(false),
    		VerifyChannelTokenNotbefore:              pulumi.Bool(false),
    		VerifyChannelTokenScopes:                 pulumi.Bool(false),
    		VerifyChannelTokenSignature:              pulumi.Bool(false),
    		VerifyChannelTokenSubject:                pulumi.Bool(false),
    	},
    	Partials: konnect.GatewayPluginJwtSignerPartialArray{
    		&konnect.GatewayPluginJwtSignerPartialArgs{
    			Id:   pulumi.String("string"),
    			Name: pulumi.String("string"),
    			Path: pulumi.String("string"),
    		},
    	},
    	Protocols: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Route: &konnect.GatewayPluginJwtSignerRouteArgs{
    		Id: pulumi.String("string"),
    	},
    	Service: &konnect.GatewayPluginJwtSignerServiceArgs{
    		Id: pulumi.String("string"),
    	},
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	UpdatedAt: pulumi.Float64(0),
    })
    
    var gatewayPluginJwtSignerResource = new GatewayPluginJwtSigner("gatewayPluginJwtSignerResource", GatewayPluginJwtSignerArgs.builder()
        .controlPlaneId("string")
        .ordering(GatewayPluginJwtSignerOrderingArgs.builder()
            .after(GatewayPluginJwtSignerOrderingAfterArgs.builder()
                .accesses("string")
                .build())
            .before(GatewayPluginJwtSignerOrderingBeforeArgs.builder()
                .accesses("string")
                .build())
            .build())
        .createdAt(0.0)
        .enabled(false)
        .gatewayPluginJwtSignerId("string")
        .instanceName("string")
        .config(GatewayPluginJwtSignerConfigArgs.builder()
            .accessTokenAudienceClaims("string")
            .accessTokenAudiencesAlloweds("string")
            .accessTokenConsumerBies("string")
            .accessTokenConsumerClaims("string")
            .accessTokenExpiryClaims("string")
            .accessTokenIntrospectionAudienceClaims("string")
            .accessTokenIntrospectionAudiencesAlloweds("string")
            .accessTokenIntrospectionAuthorization("string")
            .accessTokenIntrospectionBodyArgs("string")
            .accessTokenIntrospectionConsumerBies("string")
            .accessTokenIntrospectionConsumerClaims("string")
            .accessTokenIntrospectionEndpoint("string")
            .accessTokenIntrospectionExpiryClaims("string")
            .accessTokenIntrospectionHint("string")
            .accessTokenIntrospectionIssuerClaims("string")
            .accessTokenIntrospectionIssuersAlloweds("string")
            .accessTokenIntrospectionJwtClaims("string")
            .accessTokenIntrospectionLeeway(0.0)
            .accessTokenIntrospectionNotbeforeClaims("string")
            .accessTokenIntrospectionOptionalClaims("string")
            .accessTokenIntrospectionRequiredClaims("string")
            .accessTokenIntrospectionScopesClaims("string")
            .accessTokenIntrospectionScopesRequireds("string")
            .accessTokenIntrospectionSubjectClaims("string")
            .accessTokenIntrospectionSubjectsAlloweds("string")
            .accessTokenIntrospectionTimeout(0.0)
            .accessTokenIssuer("string")
            .accessTokenIssuerClaims("string")
            .accessTokenIssuersAlloweds("string")
            .accessTokenJwksUri("string")
            .accessTokenJwksUriClientCertificate(GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificateArgs.builder()
                .id("string")
                .build())
            .accessTokenJwksUriClientPassword("string")
            .accessTokenJwksUriClientUsername("string")
            .accessTokenJwksUriRotatePeriod(0.0)
            .accessTokenKeyset("string")
            .accessTokenKeysetClientCertificate(GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificateArgs.builder()
                .id("string")
                .build())
            .accessTokenKeysetClientPassword("string")
            .accessTokenKeysetClientUsername("string")
            .accessTokenKeysetRotatePeriod(0.0)
            .accessTokenLeeway(0.0)
            .accessTokenNotbeforeClaims("string")
            .accessTokenOptional(false)
            .accessTokenOptionalClaims("string")
            .accessTokenRequestHeader("string")
            .accessTokenRequiredClaims("string")
            .accessTokenScopesClaims("string")
            .accessTokenScopesRequireds("string")
            .accessTokenSigning(false)
            .accessTokenSigningAlgorithm("string")
            .accessTokenSubjectClaims("string")
            .accessTokenSubjectsAlloweds("string")
            .accessTokenUpstreamHeader("string")
            .accessTokenUpstreamLeeway(0.0)
            .addAccessTokenClaims(Map.of("string", "string"))
            .addChannelTokenClaims(Map.of("string", "string"))
            .addClaims(Map.of("string", "string"))
            .cacheAccessTokenIntrospection(false)
            .cacheChannelTokenIntrospection(false)
            .channelTokenAudienceClaims("string")
            .channelTokenAudiencesAlloweds("string")
            .channelTokenConsumerBies("string")
            .channelTokenConsumerClaims("string")
            .channelTokenExpiryClaims("string")
            .channelTokenIntrospectionAudienceClaims("string")
            .channelTokenIntrospectionAudiencesAlloweds("string")
            .channelTokenIntrospectionAuthorization("string")
            .channelTokenIntrospectionBodyArgs("string")
            .channelTokenIntrospectionConsumerBies("string")
            .channelTokenIntrospectionConsumerClaims("string")
            .channelTokenIntrospectionEndpoint("string")
            .channelTokenIntrospectionExpiryClaims("string")
            .channelTokenIntrospectionHint("string")
            .channelTokenIntrospectionIssuerClaims("string")
            .channelTokenIntrospectionIssuersAlloweds("string")
            .channelTokenIntrospectionJwtClaims("string")
            .channelTokenIntrospectionLeeway(0.0)
            .channelTokenIntrospectionNotbeforeClaims("string")
            .channelTokenIntrospectionOptionalClaims("string")
            .channelTokenIntrospectionRequiredClaims("string")
            .channelTokenIntrospectionScopesClaims("string")
            .channelTokenIntrospectionScopesRequireds("string")
            .channelTokenIntrospectionSubjectClaims("string")
            .channelTokenIntrospectionSubjectsAlloweds("string")
            .channelTokenIntrospectionTimeout(0.0)
            .channelTokenIssuer("string")
            .channelTokenIssuerClaims("string")
            .channelTokenIssuersAlloweds("string")
            .channelTokenJwksUri("string")
            .channelTokenJwksUriClientCertificate(GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificateArgs.builder()
                .id("string")
                .build())
            .channelTokenJwksUriClientPassword("string")
            .channelTokenJwksUriClientUsername("string")
            .channelTokenJwksUriRotatePeriod(0.0)
            .channelTokenKeyset("string")
            .channelTokenKeysetClientCertificate(GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificateArgs.builder()
                .id("string")
                .build())
            .channelTokenKeysetClientPassword("string")
            .channelTokenKeysetClientUsername("string")
            .channelTokenKeysetRotatePeriod(0.0)
            .channelTokenLeeway(0.0)
            .channelTokenNotbeforeClaims("string")
            .channelTokenOptional(false)
            .channelTokenOptionalClaims("string")
            .channelTokenRequestHeader("string")
            .channelTokenRequiredClaims("string")
            .channelTokenScopesClaims("string")
            .channelTokenScopesRequireds("string")
            .channelTokenSigning(false)
            .channelTokenSigningAlgorithm("string")
            .channelTokenSubjectClaims("string")
            .channelTokenSubjectsAlloweds("string")
            .channelTokenUpstreamHeader("string")
            .channelTokenUpstreamLeeway(0.0)
            .enableAccessTokenIntrospection(false)
            .enableChannelTokenIntrospection(false)
            .enableHsSignatures(false)
            .enableInstrumentation(false)
            .originalAccessTokenUpstreamHeader("string")
            .originalChannelTokenUpstreamHeader("string")
            .realm("string")
            .removeAccessTokenClaims("string")
            .removeChannelTokenClaims("string")
            .setAccessTokenClaims(Map.of("string", "string"))
            .setChannelTokenClaims(Map.of("string", "string"))
            .setClaims(Map.of("string", "string"))
            .trustAccessTokenIntrospection(false)
            .trustChannelTokenIntrospection(false)
            .verifyAccessTokenAudience(false)
            .verifyAccessTokenExpiry(false)
            .verifyAccessTokenIntrospectionAudience(false)
            .verifyAccessTokenIntrospectionExpiry(false)
            .verifyAccessTokenIntrospectionIssuer(false)
            .verifyAccessTokenIntrospectionNotbefore(false)
            .verifyAccessTokenIntrospectionScopes(false)
            .verifyAccessTokenIntrospectionSubject(false)
            .verifyAccessTokenIssuer(false)
            .verifyAccessTokenNotbefore(false)
            .verifyAccessTokenScopes(false)
            .verifyAccessTokenSignature(false)
            .verifyAccessTokenSubject(false)
            .verifyChannelTokenAudience(false)
            .verifyChannelTokenExpiry(false)
            .verifyChannelTokenIntrospectionAudience(false)
            .verifyChannelTokenIntrospectionExpiry(false)
            .verifyChannelTokenIntrospectionIssuer(false)
            .verifyChannelTokenIntrospectionNotbefore(false)
            .verifyChannelTokenIntrospectionScopes(false)
            .verifyChannelTokenIntrospectionSubject(false)
            .verifyChannelTokenIssuer(false)
            .verifyChannelTokenNotbefore(false)
            .verifyChannelTokenScopes(false)
            .verifyChannelTokenSignature(false)
            .verifyChannelTokenSubject(false)
            .build())
        .partials(GatewayPluginJwtSignerPartialArgs.builder()
            .id("string")
            .name("string")
            .path("string")
            .build())
        .protocols("string")
        .route(GatewayPluginJwtSignerRouteArgs.builder()
            .id("string")
            .build())
        .service(GatewayPluginJwtSignerServiceArgs.builder()
            .id("string")
            .build())
        .tags("string")
        .updatedAt(0.0)
        .build());
    
    gateway_plugin_jwt_signer_resource = konnect.GatewayPluginJwtSigner("gatewayPluginJwtSignerResource",
        control_plane_id="string",
        ordering={
            "after": {
                "accesses": ["string"],
            },
            "before": {
                "accesses": ["string"],
            },
        },
        created_at=0,
        enabled=False,
        gateway_plugin_jwt_signer_id="string",
        instance_name="string",
        config={
            "access_token_audience_claims": ["string"],
            "access_token_audiences_alloweds": ["string"],
            "access_token_consumer_bies": ["string"],
            "access_token_consumer_claims": ["string"],
            "access_token_expiry_claims": ["string"],
            "access_token_introspection_audience_claims": ["string"],
            "access_token_introspection_audiences_alloweds": ["string"],
            "access_token_introspection_authorization": "string",
            "access_token_introspection_body_args": "string",
            "access_token_introspection_consumer_bies": ["string"],
            "access_token_introspection_consumer_claims": ["string"],
            "access_token_introspection_endpoint": "string",
            "access_token_introspection_expiry_claims": ["string"],
            "access_token_introspection_hint": "string",
            "access_token_introspection_issuer_claims": ["string"],
            "access_token_introspection_issuers_alloweds": ["string"],
            "access_token_introspection_jwt_claims": ["string"],
            "access_token_introspection_leeway": 0,
            "access_token_introspection_notbefore_claims": ["string"],
            "access_token_introspection_optional_claims": [["string"]],
            "access_token_introspection_required_claims": [["string"]],
            "access_token_introspection_scopes_claims": ["string"],
            "access_token_introspection_scopes_requireds": ["string"],
            "access_token_introspection_subject_claims": ["string"],
            "access_token_introspection_subjects_alloweds": ["string"],
            "access_token_introspection_timeout": 0,
            "access_token_issuer": "string",
            "access_token_issuer_claims": ["string"],
            "access_token_issuers_alloweds": ["string"],
            "access_token_jwks_uri": "string",
            "access_token_jwks_uri_client_certificate": {
                "id": "string",
            },
            "access_token_jwks_uri_client_password": "string",
            "access_token_jwks_uri_client_username": "string",
            "access_token_jwks_uri_rotate_period": 0,
            "access_token_keyset": "string",
            "access_token_keyset_client_certificate": {
                "id": "string",
            },
            "access_token_keyset_client_password": "string",
            "access_token_keyset_client_username": "string",
            "access_token_keyset_rotate_period": 0,
            "access_token_leeway": 0,
            "access_token_notbefore_claims": ["string"],
            "access_token_optional": False,
            "access_token_optional_claims": [["string"]],
            "access_token_request_header": "string",
            "access_token_required_claims": [["string"]],
            "access_token_scopes_claims": ["string"],
            "access_token_scopes_requireds": ["string"],
            "access_token_signing": False,
            "access_token_signing_algorithm": "string",
            "access_token_subject_claims": ["string"],
            "access_token_subjects_alloweds": ["string"],
            "access_token_upstream_header": "string",
            "access_token_upstream_leeway": 0,
            "add_access_token_claims": {
                "string": "string",
            },
            "add_channel_token_claims": {
                "string": "string",
            },
            "add_claims": {
                "string": "string",
            },
            "cache_access_token_introspection": False,
            "cache_channel_token_introspection": False,
            "channel_token_audience_claims": ["string"],
            "channel_token_audiences_alloweds": ["string"],
            "channel_token_consumer_bies": ["string"],
            "channel_token_consumer_claims": ["string"],
            "channel_token_expiry_claims": ["string"],
            "channel_token_introspection_audience_claims": ["string"],
            "channel_token_introspection_audiences_alloweds": ["string"],
            "channel_token_introspection_authorization": "string",
            "channel_token_introspection_body_args": "string",
            "channel_token_introspection_consumer_bies": ["string"],
            "channel_token_introspection_consumer_claims": ["string"],
            "channel_token_introspection_endpoint": "string",
            "channel_token_introspection_expiry_claims": ["string"],
            "channel_token_introspection_hint": "string",
            "channel_token_introspection_issuer_claims": ["string"],
            "channel_token_introspection_issuers_alloweds": ["string"],
            "channel_token_introspection_jwt_claims": ["string"],
            "channel_token_introspection_leeway": 0,
            "channel_token_introspection_notbefore_claims": ["string"],
            "channel_token_introspection_optional_claims": [["string"]],
            "channel_token_introspection_required_claims": [["string"]],
            "channel_token_introspection_scopes_claims": ["string"],
            "channel_token_introspection_scopes_requireds": ["string"],
            "channel_token_introspection_subject_claims": ["string"],
            "channel_token_introspection_subjects_alloweds": ["string"],
            "channel_token_introspection_timeout": 0,
            "channel_token_issuer": "string",
            "channel_token_issuer_claims": ["string"],
            "channel_token_issuers_alloweds": ["string"],
            "channel_token_jwks_uri": "string",
            "channel_token_jwks_uri_client_certificate": {
                "id": "string",
            },
            "channel_token_jwks_uri_client_password": "string",
            "channel_token_jwks_uri_client_username": "string",
            "channel_token_jwks_uri_rotate_period": 0,
            "channel_token_keyset": "string",
            "channel_token_keyset_client_certificate": {
                "id": "string",
            },
            "channel_token_keyset_client_password": "string",
            "channel_token_keyset_client_username": "string",
            "channel_token_keyset_rotate_period": 0,
            "channel_token_leeway": 0,
            "channel_token_notbefore_claims": ["string"],
            "channel_token_optional": False,
            "channel_token_optional_claims": [["string"]],
            "channel_token_request_header": "string",
            "channel_token_required_claims": [["string"]],
            "channel_token_scopes_claims": ["string"],
            "channel_token_scopes_requireds": ["string"],
            "channel_token_signing": False,
            "channel_token_signing_algorithm": "string",
            "channel_token_subject_claims": ["string"],
            "channel_token_subjects_alloweds": ["string"],
            "channel_token_upstream_header": "string",
            "channel_token_upstream_leeway": 0,
            "enable_access_token_introspection": False,
            "enable_channel_token_introspection": False,
            "enable_hs_signatures": False,
            "enable_instrumentation": False,
            "original_access_token_upstream_header": "string",
            "original_channel_token_upstream_header": "string",
            "realm": "string",
            "remove_access_token_claims": ["string"],
            "remove_channel_token_claims": ["string"],
            "set_access_token_claims": {
                "string": "string",
            },
            "set_channel_token_claims": {
                "string": "string",
            },
            "set_claims": {
                "string": "string",
            },
            "trust_access_token_introspection": False,
            "trust_channel_token_introspection": False,
            "verify_access_token_audience": False,
            "verify_access_token_expiry": False,
            "verify_access_token_introspection_audience": False,
            "verify_access_token_introspection_expiry": False,
            "verify_access_token_introspection_issuer": False,
            "verify_access_token_introspection_notbefore": False,
            "verify_access_token_introspection_scopes": False,
            "verify_access_token_introspection_subject": False,
            "verify_access_token_issuer": False,
            "verify_access_token_notbefore": False,
            "verify_access_token_scopes": False,
            "verify_access_token_signature": False,
            "verify_access_token_subject": False,
            "verify_channel_token_audience": False,
            "verify_channel_token_expiry": False,
            "verify_channel_token_introspection_audience": False,
            "verify_channel_token_introspection_expiry": False,
            "verify_channel_token_introspection_issuer": False,
            "verify_channel_token_introspection_notbefore": False,
            "verify_channel_token_introspection_scopes": False,
            "verify_channel_token_introspection_subject": False,
            "verify_channel_token_issuer": False,
            "verify_channel_token_notbefore": False,
            "verify_channel_token_scopes": False,
            "verify_channel_token_signature": False,
            "verify_channel_token_subject": False,
        },
        partials=[{
            "id": "string",
            "name": "string",
            "path": "string",
        }],
        protocols=["string"],
        route={
            "id": "string",
        },
        service={
            "id": "string",
        },
        tags=["string"],
        updated_at=0)
    
    const gatewayPluginJwtSignerResource = new konnect.GatewayPluginJwtSigner("gatewayPluginJwtSignerResource", {
        controlPlaneId: "string",
        ordering: {
            after: {
                accesses: ["string"],
            },
            before: {
                accesses: ["string"],
            },
        },
        createdAt: 0,
        enabled: false,
        gatewayPluginJwtSignerId: "string",
        instanceName: "string",
        config: {
            accessTokenAudienceClaims: ["string"],
            accessTokenAudiencesAlloweds: ["string"],
            accessTokenConsumerBies: ["string"],
            accessTokenConsumerClaims: ["string"],
            accessTokenExpiryClaims: ["string"],
            accessTokenIntrospectionAudienceClaims: ["string"],
            accessTokenIntrospectionAudiencesAlloweds: ["string"],
            accessTokenIntrospectionAuthorization: "string",
            accessTokenIntrospectionBodyArgs: "string",
            accessTokenIntrospectionConsumerBies: ["string"],
            accessTokenIntrospectionConsumerClaims: ["string"],
            accessTokenIntrospectionEndpoint: "string",
            accessTokenIntrospectionExpiryClaims: ["string"],
            accessTokenIntrospectionHint: "string",
            accessTokenIntrospectionIssuerClaims: ["string"],
            accessTokenIntrospectionIssuersAlloweds: ["string"],
            accessTokenIntrospectionJwtClaims: ["string"],
            accessTokenIntrospectionLeeway: 0,
            accessTokenIntrospectionNotbeforeClaims: ["string"],
            accessTokenIntrospectionOptionalClaims: [["string"]],
            accessTokenIntrospectionRequiredClaims: [["string"]],
            accessTokenIntrospectionScopesClaims: ["string"],
            accessTokenIntrospectionScopesRequireds: ["string"],
            accessTokenIntrospectionSubjectClaims: ["string"],
            accessTokenIntrospectionSubjectsAlloweds: ["string"],
            accessTokenIntrospectionTimeout: 0,
            accessTokenIssuer: "string",
            accessTokenIssuerClaims: ["string"],
            accessTokenIssuersAlloweds: ["string"],
            accessTokenJwksUri: "string",
            accessTokenJwksUriClientCertificate: {
                id: "string",
            },
            accessTokenJwksUriClientPassword: "string",
            accessTokenJwksUriClientUsername: "string",
            accessTokenJwksUriRotatePeriod: 0,
            accessTokenKeyset: "string",
            accessTokenKeysetClientCertificate: {
                id: "string",
            },
            accessTokenKeysetClientPassword: "string",
            accessTokenKeysetClientUsername: "string",
            accessTokenKeysetRotatePeriod: 0,
            accessTokenLeeway: 0,
            accessTokenNotbeforeClaims: ["string"],
            accessTokenOptional: false,
            accessTokenOptionalClaims: [["string"]],
            accessTokenRequestHeader: "string",
            accessTokenRequiredClaims: [["string"]],
            accessTokenScopesClaims: ["string"],
            accessTokenScopesRequireds: ["string"],
            accessTokenSigning: false,
            accessTokenSigningAlgorithm: "string",
            accessTokenSubjectClaims: ["string"],
            accessTokenSubjectsAlloweds: ["string"],
            accessTokenUpstreamHeader: "string",
            accessTokenUpstreamLeeway: 0,
            addAccessTokenClaims: {
                string: "string",
            },
            addChannelTokenClaims: {
                string: "string",
            },
            addClaims: {
                string: "string",
            },
            cacheAccessTokenIntrospection: false,
            cacheChannelTokenIntrospection: false,
            channelTokenAudienceClaims: ["string"],
            channelTokenAudiencesAlloweds: ["string"],
            channelTokenConsumerBies: ["string"],
            channelTokenConsumerClaims: ["string"],
            channelTokenExpiryClaims: ["string"],
            channelTokenIntrospectionAudienceClaims: ["string"],
            channelTokenIntrospectionAudiencesAlloweds: ["string"],
            channelTokenIntrospectionAuthorization: "string",
            channelTokenIntrospectionBodyArgs: "string",
            channelTokenIntrospectionConsumerBies: ["string"],
            channelTokenIntrospectionConsumerClaims: ["string"],
            channelTokenIntrospectionEndpoint: "string",
            channelTokenIntrospectionExpiryClaims: ["string"],
            channelTokenIntrospectionHint: "string",
            channelTokenIntrospectionIssuerClaims: ["string"],
            channelTokenIntrospectionIssuersAlloweds: ["string"],
            channelTokenIntrospectionJwtClaims: ["string"],
            channelTokenIntrospectionLeeway: 0,
            channelTokenIntrospectionNotbeforeClaims: ["string"],
            channelTokenIntrospectionOptionalClaims: [["string"]],
            channelTokenIntrospectionRequiredClaims: [["string"]],
            channelTokenIntrospectionScopesClaims: ["string"],
            channelTokenIntrospectionScopesRequireds: ["string"],
            channelTokenIntrospectionSubjectClaims: ["string"],
            channelTokenIntrospectionSubjectsAlloweds: ["string"],
            channelTokenIntrospectionTimeout: 0,
            channelTokenIssuer: "string",
            channelTokenIssuerClaims: ["string"],
            channelTokenIssuersAlloweds: ["string"],
            channelTokenJwksUri: "string",
            channelTokenJwksUriClientCertificate: {
                id: "string",
            },
            channelTokenJwksUriClientPassword: "string",
            channelTokenJwksUriClientUsername: "string",
            channelTokenJwksUriRotatePeriod: 0,
            channelTokenKeyset: "string",
            channelTokenKeysetClientCertificate: {
                id: "string",
            },
            channelTokenKeysetClientPassword: "string",
            channelTokenKeysetClientUsername: "string",
            channelTokenKeysetRotatePeriod: 0,
            channelTokenLeeway: 0,
            channelTokenNotbeforeClaims: ["string"],
            channelTokenOptional: false,
            channelTokenOptionalClaims: [["string"]],
            channelTokenRequestHeader: "string",
            channelTokenRequiredClaims: [["string"]],
            channelTokenScopesClaims: ["string"],
            channelTokenScopesRequireds: ["string"],
            channelTokenSigning: false,
            channelTokenSigningAlgorithm: "string",
            channelTokenSubjectClaims: ["string"],
            channelTokenSubjectsAlloweds: ["string"],
            channelTokenUpstreamHeader: "string",
            channelTokenUpstreamLeeway: 0,
            enableAccessTokenIntrospection: false,
            enableChannelTokenIntrospection: false,
            enableHsSignatures: false,
            enableInstrumentation: false,
            originalAccessTokenUpstreamHeader: "string",
            originalChannelTokenUpstreamHeader: "string",
            realm: "string",
            removeAccessTokenClaims: ["string"],
            removeChannelTokenClaims: ["string"],
            setAccessTokenClaims: {
                string: "string",
            },
            setChannelTokenClaims: {
                string: "string",
            },
            setClaims: {
                string: "string",
            },
            trustAccessTokenIntrospection: false,
            trustChannelTokenIntrospection: false,
            verifyAccessTokenAudience: false,
            verifyAccessTokenExpiry: false,
            verifyAccessTokenIntrospectionAudience: false,
            verifyAccessTokenIntrospectionExpiry: false,
            verifyAccessTokenIntrospectionIssuer: false,
            verifyAccessTokenIntrospectionNotbefore: false,
            verifyAccessTokenIntrospectionScopes: false,
            verifyAccessTokenIntrospectionSubject: false,
            verifyAccessTokenIssuer: false,
            verifyAccessTokenNotbefore: false,
            verifyAccessTokenScopes: false,
            verifyAccessTokenSignature: false,
            verifyAccessTokenSubject: false,
            verifyChannelTokenAudience: false,
            verifyChannelTokenExpiry: false,
            verifyChannelTokenIntrospectionAudience: false,
            verifyChannelTokenIntrospectionExpiry: false,
            verifyChannelTokenIntrospectionIssuer: false,
            verifyChannelTokenIntrospectionNotbefore: false,
            verifyChannelTokenIntrospectionScopes: false,
            verifyChannelTokenIntrospectionSubject: false,
            verifyChannelTokenIssuer: false,
            verifyChannelTokenNotbefore: false,
            verifyChannelTokenScopes: false,
            verifyChannelTokenSignature: false,
            verifyChannelTokenSubject: false,
        },
        partials: [{
            id: "string",
            name: "string",
            path: "string",
        }],
        protocols: ["string"],
        route: {
            id: "string",
        },
        service: {
            id: "string",
        },
        tags: ["string"],
        updatedAt: 0,
    });
    
    type: konnect:GatewayPluginJwtSigner
    properties:
        config:
            accessTokenAudienceClaims:
                - string
            accessTokenAudiencesAlloweds:
                - string
            accessTokenConsumerBies:
                - string
            accessTokenConsumerClaims:
                - string
            accessTokenExpiryClaims:
                - string
            accessTokenIntrospectionAudienceClaims:
                - string
            accessTokenIntrospectionAudiencesAlloweds:
                - string
            accessTokenIntrospectionAuthorization: string
            accessTokenIntrospectionBodyArgs: string
            accessTokenIntrospectionConsumerBies:
                - string
            accessTokenIntrospectionConsumerClaims:
                - string
            accessTokenIntrospectionEndpoint: string
            accessTokenIntrospectionExpiryClaims:
                - string
            accessTokenIntrospectionHint: string
            accessTokenIntrospectionIssuerClaims:
                - string
            accessTokenIntrospectionIssuersAlloweds:
                - string
            accessTokenIntrospectionJwtClaims:
                - string
            accessTokenIntrospectionLeeway: 0
            accessTokenIntrospectionNotbeforeClaims:
                - string
            accessTokenIntrospectionOptionalClaims:
                - - string
            accessTokenIntrospectionRequiredClaims:
                - - string
            accessTokenIntrospectionScopesClaims:
                - string
            accessTokenIntrospectionScopesRequireds:
                - string
            accessTokenIntrospectionSubjectClaims:
                - string
            accessTokenIntrospectionSubjectsAlloweds:
                - string
            accessTokenIntrospectionTimeout: 0
            accessTokenIssuer: string
            accessTokenIssuerClaims:
                - string
            accessTokenIssuersAlloweds:
                - string
            accessTokenJwksUri: string
            accessTokenJwksUriClientCertificate:
                id: string
            accessTokenJwksUriClientPassword: string
            accessTokenJwksUriClientUsername: string
            accessTokenJwksUriRotatePeriod: 0
            accessTokenKeyset: string
            accessTokenKeysetClientCertificate:
                id: string
            accessTokenKeysetClientPassword: string
            accessTokenKeysetClientUsername: string
            accessTokenKeysetRotatePeriod: 0
            accessTokenLeeway: 0
            accessTokenNotbeforeClaims:
                - string
            accessTokenOptional: false
            accessTokenOptionalClaims:
                - - string
            accessTokenRequestHeader: string
            accessTokenRequiredClaims:
                - - string
            accessTokenScopesClaims:
                - string
            accessTokenScopesRequireds:
                - string
            accessTokenSigning: false
            accessTokenSigningAlgorithm: string
            accessTokenSubjectClaims:
                - string
            accessTokenSubjectsAlloweds:
                - string
            accessTokenUpstreamHeader: string
            accessTokenUpstreamLeeway: 0
            addAccessTokenClaims:
                string: string
            addChannelTokenClaims:
                string: string
            addClaims:
                string: string
            cacheAccessTokenIntrospection: false
            cacheChannelTokenIntrospection: false
            channelTokenAudienceClaims:
                - string
            channelTokenAudiencesAlloweds:
                - string
            channelTokenConsumerBies:
                - string
            channelTokenConsumerClaims:
                - string
            channelTokenExpiryClaims:
                - string
            channelTokenIntrospectionAudienceClaims:
                - string
            channelTokenIntrospectionAudiencesAlloweds:
                - string
            channelTokenIntrospectionAuthorization: string
            channelTokenIntrospectionBodyArgs: string
            channelTokenIntrospectionConsumerBies:
                - string
            channelTokenIntrospectionConsumerClaims:
                - string
            channelTokenIntrospectionEndpoint: string
            channelTokenIntrospectionExpiryClaims:
                - string
            channelTokenIntrospectionHint: string
            channelTokenIntrospectionIssuerClaims:
                - string
            channelTokenIntrospectionIssuersAlloweds:
                - string
            channelTokenIntrospectionJwtClaims:
                - string
            channelTokenIntrospectionLeeway: 0
            channelTokenIntrospectionNotbeforeClaims:
                - string
            channelTokenIntrospectionOptionalClaims:
                - - string
            channelTokenIntrospectionRequiredClaims:
                - - string
            channelTokenIntrospectionScopesClaims:
                - string
            channelTokenIntrospectionScopesRequireds:
                - string
            channelTokenIntrospectionSubjectClaims:
                - string
            channelTokenIntrospectionSubjectsAlloweds:
                - string
            channelTokenIntrospectionTimeout: 0
            channelTokenIssuer: string
            channelTokenIssuerClaims:
                - string
            channelTokenIssuersAlloweds:
                - string
            channelTokenJwksUri: string
            channelTokenJwksUriClientCertificate:
                id: string
            channelTokenJwksUriClientPassword: string
            channelTokenJwksUriClientUsername: string
            channelTokenJwksUriRotatePeriod: 0
            channelTokenKeyset: string
            channelTokenKeysetClientCertificate:
                id: string
            channelTokenKeysetClientPassword: string
            channelTokenKeysetClientUsername: string
            channelTokenKeysetRotatePeriod: 0
            channelTokenLeeway: 0
            channelTokenNotbeforeClaims:
                - string
            channelTokenOptional: false
            channelTokenOptionalClaims:
                - - string
            channelTokenRequestHeader: string
            channelTokenRequiredClaims:
                - - string
            channelTokenScopesClaims:
                - string
            channelTokenScopesRequireds:
                - string
            channelTokenSigning: false
            channelTokenSigningAlgorithm: string
            channelTokenSubjectClaims:
                - string
            channelTokenSubjectsAlloweds:
                - string
            channelTokenUpstreamHeader: string
            channelTokenUpstreamLeeway: 0
            enableAccessTokenIntrospection: false
            enableChannelTokenIntrospection: false
            enableHsSignatures: false
            enableInstrumentation: false
            originalAccessTokenUpstreamHeader: string
            originalChannelTokenUpstreamHeader: string
            realm: string
            removeAccessTokenClaims:
                - string
            removeChannelTokenClaims:
                - string
            setAccessTokenClaims:
                string: string
            setChannelTokenClaims:
                string: string
            setClaims:
                string: string
            trustAccessTokenIntrospection: false
            trustChannelTokenIntrospection: false
            verifyAccessTokenAudience: false
            verifyAccessTokenExpiry: false
            verifyAccessTokenIntrospectionAudience: false
            verifyAccessTokenIntrospectionExpiry: false
            verifyAccessTokenIntrospectionIssuer: false
            verifyAccessTokenIntrospectionNotbefore: false
            verifyAccessTokenIntrospectionScopes: false
            verifyAccessTokenIntrospectionSubject: false
            verifyAccessTokenIssuer: false
            verifyAccessTokenNotbefore: false
            verifyAccessTokenScopes: false
            verifyAccessTokenSignature: false
            verifyAccessTokenSubject: false
            verifyChannelTokenAudience: false
            verifyChannelTokenExpiry: false
            verifyChannelTokenIntrospectionAudience: false
            verifyChannelTokenIntrospectionExpiry: false
            verifyChannelTokenIntrospectionIssuer: false
            verifyChannelTokenIntrospectionNotbefore: false
            verifyChannelTokenIntrospectionScopes: false
            verifyChannelTokenIntrospectionSubject: false
            verifyChannelTokenIssuer: false
            verifyChannelTokenNotbefore: false
            verifyChannelTokenScopes: false
            verifyChannelTokenSignature: false
            verifyChannelTokenSubject: false
        controlPlaneId: string
        createdAt: 0
        enabled: false
        gatewayPluginJwtSignerId: string
        instanceName: string
        ordering:
            after:
                accesses:
                    - string
            before:
                accesses:
                    - string
        partials:
            - id: string
              name: string
              path: string
        protocols:
            - string
        route:
            id: string
        service:
            id: string
        tags:
            - string
        updatedAt: 0
    

    GatewayPluginJwtSigner Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The GatewayPluginJwtSigner resource accepts the following input properties:

    ControlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    Config GatewayPluginJwtSignerConfig
    CreatedAt double
    Unix epoch when the resource was created.
    Enabled bool
    Whether the plugin is applied. Default: true
    GatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    InstanceName string
    A unique string representing a UTF-8 encoded name.
    Ordering GatewayPluginJwtSignerOrdering
    Partials List<GatewayPluginJwtSignerPartial>
    A list of partials to be used by the plugin.
    Protocols List<string>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    Route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    Service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    Tags List<string>
    An optional set of strings associated with the Plugin for grouping and filtering.
    UpdatedAt double
    Unix epoch when the resource was last updated.
    ControlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    Config GatewayPluginJwtSignerConfigArgs
    CreatedAt float64
    Unix epoch when the resource was created.
    Enabled bool
    Whether the plugin is applied. Default: true
    GatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    InstanceName string
    A unique string representing a UTF-8 encoded name.
    Ordering GatewayPluginJwtSignerOrderingArgs
    Partials []GatewayPluginJwtSignerPartialArgs
    A list of partials to be used by the plugin.
    Protocols []string
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    Route GatewayPluginJwtSignerRouteArgs
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    Service GatewayPluginJwtSignerServiceArgs
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    Tags []string
    An optional set of strings associated with the Plugin for grouping and filtering.
    UpdatedAt float64
    Unix epoch when the resource was last updated.
    controlPlaneId String
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    config GatewayPluginJwtSignerConfig
    createdAt Double
    Unix epoch when the resource was created.
    enabled Boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId String
    A string representing a UUID (universally unique identifier).
    instanceName String
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrdering
    partials List<GatewayPluginJwtSignerPartial>
    A list of partials to be used by the plugin.
    protocols List<String>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags List<String>
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt Double
    Unix epoch when the resource was last updated.
    controlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    config GatewayPluginJwtSignerConfig
    createdAt number
    Unix epoch when the resource was created.
    enabled boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    instanceName string
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrdering
    partials GatewayPluginJwtSignerPartial[]
    A list of partials to be used by the plugin.
    protocols string[]
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags string[]
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt number
    Unix epoch when the resource was last updated.
    control_plane_id str
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    config GatewayPluginJwtSignerConfigArgs
    created_at float
    Unix epoch when the resource was created.
    enabled bool
    Whether the plugin is applied. Default: true
    gateway_plugin_jwt_signer_id str
    A string representing a UUID (universally unique identifier).
    instance_name str
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrderingArgs
    partials Sequence[GatewayPluginJwtSignerPartialArgs]
    A list of partials to be used by the plugin.
    protocols Sequence[str]
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRouteArgs
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerServiceArgs
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags Sequence[str]
    An optional set of strings associated with the Plugin for grouping and filtering.
    updated_at float
    Unix epoch when the resource was last updated.
    controlPlaneId String
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    config Property Map
    createdAt Number
    Unix epoch when the resource was created.
    enabled Boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId String
    A string representing a UUID (universally unique identifier).
    instanceName String
    A unique string representing a UTF-8 encoded name.
    ordering Property Map
    partials List<Property Map>
    A list of partials to be used by the plugin.
    protocols List<String>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route Property Map
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service Property Map
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags List<String>
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt Number
    Unix epoch when the resource was last updated.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the GatewayPluginJwtSigner resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing GatewayPluginJwtSigner Resource

    Get an existing GatewayPluginJwtSigner resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: GatewayPluginJwtSignerState, opts?: CustomResourceOptions): GatewayPluginJwtSigner
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            config: Optional[GatewayPluginJwtSignerConfigArgs] = None,
            control_plane_id: Optional[str] = None,
            created_at: Optional[float] = None,
            enabled: Optional[bool] = None,
            gateway_plugin_jwt_signer_id: Optional[str] = None,
            instance_name: Optional[str] = None,
            ordering: Optional[GatewayPluginJwtSignerOrderingArgs] = None,
            partials: Optional[Sequence[GatewayPluginJwtSignerPartialArgs]] = None,
            protocols: Optional[Sequence[str]] = None,
            route: Optional[GatewayPluginJwtSignerRouteArgs] = None,
            service: Optional[GatewayPluginJwtSignerServiceArgs] = None,
            tags: Optional[Sequence[str]] = None,
            updated_at: Optional[float] = None) -> GatewayPluginJwtSigner
    func GetGatewayPluginJwtSigner(ctx *Context, name string, id IDInput, state *GatewayPluginJwtSignerState, opts ...ResourceOption) (*GatewayPluginJwtSigner, error)
    public static GatewayPluginJwtSigner Get(string name, Input<string> id, GatewayPluginJwtSignerState? state, CustomResourceOptions? opts = null)
    public static GatewayPluginJwtSigner get(String name, Output<String> id, GatewayPluginJwtSignerState state, CustomResourceOptions options)
    resources:  _:    type: konnect:GatewayPluginJwtSigner    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Config GatewayPluginJwtSignerConfig
    ControlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    CreatedAt double
    Unix epoch when the resource was created.
    Enabled bool
    Whether the plugin is applied. Default: true
    GatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    InstanceName string
    A unique string representing a UTF-8 encoded name.
    Ordering GatewayPluginJwtSignerOrdering
    Partials List<GatewayPluginJwtSignerPartial>
    A list of partials to be used by the plugin.
    Protocols List<string>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    Route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    Service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    Tags List<string>
    An optional set of strings associated with the Plugin for grouping and filtering.
    UpdatedAt double
    Unix epoch when the resource was last updated.
    Config GatewayPluginJwtSignerConfigArgs
    ControlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    CreatedAt float64
    Unix epoch when the resource was created.
    Enabled bool
    Whether the plugin is applied. Default: true
    GatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    InstanceName string
    A unique string representing a UTF-8 encoded name.
    Ordering GatewayPluginJwtSignerOrderingArgs
    Partials []GatewayPluginJwtSignerPartialArgs
    A list of partials to be used by the plugin.
    Protocols []string
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    Route GatewayPluginJwtSignerRouteArgs
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    Service GatewayPluginJwtSignerServiceArgs
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    Tags []string
    An optional set of strings associated with the Plugin for grouping and filtering.
    UpdatedAt float64
    Unix epoch when the resource was last updated.
    config GatewayPluginJwtSignerConfig
    controlPlaneId String
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    createdAt Double
    Unix epoch when the resource was created.
    enabled Boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId String
    A string representing a UUID (universally unique identifier).
    instanceName String
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrdering
    partials List<GatewayPluginJwtSignerPartial>
    A list of partials to be used by the plugin.
    protocols List<String>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags List<String>
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt Double
    Unix epoch when the resource was last updated.
    config GatewayPluginJwtSignerConfig
    controlPlaneId string
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    createdAt number
    Unix epoch when the resource was created.
    enabled boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId string
    A string representing a UUID (universally unique identifier).
    instanceName string
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrdering
    partials GatewayPluginJwtSignerPartial[]
    A list of partials to be used by the plugin.
    protocols string[]
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRoute
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerService
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags string[]
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt number
    Unix epoch when the resource was last updated.
    config GatewayPluginJwtSignerConfigArgs
    control_plane_id str
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    created_at float
    Unix epoch when the resource was created.
    enabled bool
    Whether the plugin is applied. Default: true
    gateway_plugin_jwt_signer_id str
    A string representing a UUID (universally unique identifier).
    instance_name str
    A unique string representing a UTF-8 encoded name.
    ordering GatewayPluginJwtSignerOrderingArgs
    partials Sequence[GatewayPluginJwtSignerPartialArgs]
    A list of partials to be used by the plugin.
    protocols Sequence[str]
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route GatewayPluginJwtSignerRouteArgs
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service GatewayPluginJwtSignerServiceArgs
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags Sequence[str]
    An optional set of strings associated with the Plugin for grouping and filtering.
    updated_at float
    Unix epoch when the resource was last updated.
    config Property Map
    controlPlaneId String
    The UUID of your control plane. This variable is available in the Konnect manager. Requires replacement if changed.
    createdAt Number
    Unix epoch when the resource was created.
    enabled Boolean
    Whether the plugin is applied. Default: true
    gatewayPluginJwtSignerId String
    A string representing a UUID (universally unique identifier).
    instanceName String
    A unique string representing a UTF-8 encoded name.
    ordering Property Map
    partials List<Property Map>
    A list of partials to be used by the plugin.
    protocols List<String>
    A set of strings representing HTTP protocols. Default: ["grpc","grpcs","http","https"]
    route Property Map
    If set, the plugin will only activate when receiving requests via the specified route. Leave unset for the plugin to activate regardless of the route being used.
    service Property Map
    If set, the plugin will only activate when receiving requests via one of the routes belonging to the specified Service. Leave unset for the plugin to activate regardless of the Service being matched.
    tags List<String>
    An optional set of strings associated with the Plugin for grouping and filtering.
    updatedAt Number
    Unix epoch when the resource was last updated.

    Supporting Types

    GatewayPluginJwtSignerConfig, GatewayPluginJwtSignerConfigArgs

    AccessTokenAudienceClaims List<string>
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    AccessTokenAudiencesAlloweds List<string>
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    AccessTokenConsumerBies List<string>
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    AccessTokenConsumerClaims List<string>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    AccessTokenExpiryClaims List<string>
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    AccessTokenIntrospectionAudienceClaims List<string>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    AccessTokenIntrospectionAudiencesAlloweds List<string>
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    AccessTokenIntrospectionAuthorization string
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    AccessTokenIntrospectionBodyArgs string
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    AccessTokenIntrospectionConsumerBies List<string>
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    AccessTokenIntrospectionConsumerClaims List<string>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    AccessTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    AccessTokenIntrospectionExpiryClaims List<string>
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    AccessTokenIntrospectionHint string
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    AccessTokenIntrospectionIssuerClaims List<string>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    AccessTokenIntrospectionIssuersAlloweds List<string>
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    AccessTokenIntrospectionJwtClaims List<string>
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    AccessTokenIntrospectionLeeway double
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    AccessTokenIntrospectionNotbeforeClaims List<string>
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    AccessTokenIntrospectionOptionalClaims List<ImmutableArray<string>>
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenIntrospectionRequiredClaims List<ImmutableArray<string>>
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenIntrospectionScopesClaims List<string>
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    AccessTokenIntrospectionScopesRequireds List<string>
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    AccessTokenIntrospectionSubjectClaims List<string>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    AccessTokenIntrospectionSubjectsAlloweds List<string>
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    AccessTokenIntrospectionTimeout double
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    AccessTokenIssuer string
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    AccessTokenIssuerClaims List<string>
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    AccessTokenIssuersAlloweds List<string>
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    AccessTokenJwksUri string
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    AccessTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    AccessTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    AccessTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    AccessTokenJwksUriRotatePeriod double
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    AccessTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    AccessTokenKeysetClientCertificate GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    AccessTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    AccessTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    AccessTokenKeysetRotatePeriod double
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    AccessTokenLeeway double
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    AccessTokenNotbeforeClaims List<string>
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    AccessTokenOptional bool
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    AccessTokenOptionalClaims List<ImmutableArray<string>>
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenRequestHeader string
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    AccessTokenRequiredClaims List<ImmutableArray<string>>
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenScopesClaims List<string>
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    AccessTokenScopesRequireds List<string>
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    AccessTokenSigning bool
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    AccessTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    AccessTokenSubjectClaims List<string>
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    AccessTokenSubjectsAlloweds List<string>
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    AccessTokenUpstreamHeader string
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    AccessTokenUpstreamLeeway double
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    AddAccessTokenClaims Dictionary<string, string>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    AddChannelTokenClaims Dictionary<string, string>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    AddClaims Dictionary<string, string>
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    CacheAccessTokenIntrospection bool
    Whether to cache access token introspection results. Default: true
    CacheChannelTokenIntrospection bool
    Whether to cache channel token introspection results. Default: true
    ChannelTokenAudienceClaims List<string>
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    ChannelTokenAudiencesAlloweds List<string>
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    ChannelTokenConsumerBies List<string>
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    ChannelTokenConsumerClaims List<string>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    ChannelTokenExpiryClaims List<string>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    ChannelTokenIntrospectionAudienceClaims List<string>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    ChannelTokenIntrospectionAudiencesAlloweds List<string>
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    ChannelTokenIntrospectionAuthorization string
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    ChannelTokenIntrospectionBodyArgs string
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    ChannelTokenIntrospectionConsumerBies List<string>
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    ChannelTokenIntrospectionConsumerClaims List<string>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    ChannelTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    ChannelTokenIntrospectionExpiryClaims List<string>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    ChannelTokenIntrospectionHint string
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    ChannelTokenIntrospectionIssuerClaims List<string>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    ChannelTokenIntrospectionIssuersAlloweds List<string>
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    ChannelTokenIntrospectionJwtClaims List<string>
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    ChannelTokenIntrospectionLeeway double
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    ChannelTokenIntrospectionNotbeforeClaims List<string>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    ChannelTokenIntrospectionOptionalClaims List<ImmutableArray<string>>
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenIntrospectionRequiredClaims List<ImmutableArray<string>>
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenIntrospectionScopesClaims List<string>
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    ChannelTokenIntrospectionScopesRequireds List<string>
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    ChannelTokenIntrospectionSubjectClaims List<string>
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    ChannelTokenIntrospectionSubjectsAlloweds List<string>
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    ChannelTokenIntrospectionTimeout double
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    ChannelTokenIssuer string
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    ChannelTokenIssuerClaims List<string>
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    ChannelTokenIssuersAlloweds List<string>
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    ChannelTokenJwksUri string
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    ChannelTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    ChannelTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    ChannelTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    ChannelTokenJwksUriRotatePeriod double
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    ChannelTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    ChannelTokenKeysetClientCertificate GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    ChannelTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    ChannelTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    ChannelTokenKeysetRotatePeriod double
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    ChannelTokenLeeway double
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    ChannelTokenNotbeforeClaims List<string>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    ChannelTokenOptional bool
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    ChannelTokenOptionalClaims List<ImmutableArray<string>>
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenRequestHeader string
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    ChannelTokenRequiredClaims List<ImmutableArray<string>>
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenScopesClaims List<string>
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    ChannelTokenScopesRequireds List<string>
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    ChannelTokenSigning bool
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    ChannelTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    ChannelTokenSubjectClaims List<string>
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    ChannelTokenSubjectsAlloweds List<string>
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    ChannelTokenUpstreamHeader string
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    ChannelTokenUpstreamLeeway double
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    EnableAccessTokenIntrospection bool
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    EnableChannelTokenIntrospection bool
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    EnableHsSignatures bool
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    EnableInstrumentation bool
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    OriginalAccessTokenUpstreamHeader string
    The HTTP header name used to store the original access token.
    OriginalChannelTokenUpstreamHeader string
    The HTTP header name used to store the original channel token.
    Realm string
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    RemoveAccessTokenClaims List<string>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    RemoveChannelTokenClaims List<string>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    SetAccessTokenClaims Dictionary<string, string>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    SetChannelTokenClaims Dictionary<string, string>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    SetClaims Dictionary<string, string>
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    TrustAccessTokenIntrospection bool
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    TrustChannelTokenIntrospection bool
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    VerifyAccessTokenAudience bool
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    VerifyAccessTokenExpiry bool
    Quickly turn access token expiry verification off and on as needed. Default: true
    VerifyAccessTokenIntrospectionAudience bool
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    VerifyAccessTokenIntrospectionExpiry bool
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    VerifyAccessTokenIntrospectionIssuer bool
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    VerifyAccessTokenIntrospectionNotbefore bool
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    VerifyAccessTokenIntrospectionScopes bool
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    VerifyAccessTokenIntrospectionSubject bool
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    VerifyAccessTokenIssuer bool
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    VerifyAccessTokenNotbefore bool
    Quickly turn off and on the access token notbefore verification. Default: false
    VerifyAccessTokenScopes bool
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    VerifyAccessTokenSignature bool
    Quickly turn access token signature verification off and on as needed. Default: true
    VerifyAccessTokenSubject bool
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    VerifyChannelTokenAudience bool
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    VerifyChannelTokenExpiry bool
    Default: true
    VerifyChannelTokenIntrospectionAudience bool
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    VerifyChannelTokenIntrospectionExpiry bool
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    VerifyChannelTokenIntrospectionIssuer bool
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    VerifyChannelTokenIntrospectionNotbefore bool
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    VerifyChannelTokenIntrospectionScopes bool
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    VerifyChannelTokenIntrospectionSubject bool
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    VerifyChannelTokenIssuer bool
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    VerifyChannelTokenNotbefore bool
    Quickly turn off and on the channel token notbefore verification. Default: false
    VerifyChannelTokenScopes bool
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    VerifyChannelTokenSignature bool
    Quickly turn on/off the channel token signature verification. Default: true
    VerifyChannelTokenSubject bool
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true
    AccessTokenAudienceClaims []string
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    AccessTokenAudiencesAlloweds []string
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    AccessTokenConsumerBies []string
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    AccessTokenConsumerClaims []string
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    AccessTokenExpiryClaims []string
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    AccessTokenIntrospectionAudienceClaims []string
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    AccessTokenIntrospectionAudiencesAlloweds []string
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    AccessTokenIntrospectionAuthorization string
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    AccessTokenIntrospectionBodyArgs string
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    AccessTokenIntrospectionConsumerBies []string
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    AccessTokenIntrospectionConsumerClaims []string
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    AccessTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    AccessTokenIntrospectionExpiryClaims []string
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    AccessTokenIntrospectionHint string
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    AccessTokenIntrospectionIssuerClaims []string
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    AccessTokenIntrospectionIssuersAlloweds []string
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    AccessTokenIntrospectionJwtClaims []string
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    AccessTokenIntrospectionLeeway float64
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    AccessTokenIntrospectionNotbeforeClaims []string
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    AccessTokenIntrospectionOptionalClaims [][]string
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenIntrospectionRequiredClaims [][]string
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenIntrospectionScopesClaims []string
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    AccessTokenIntrospectionScopesRequireds []string
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    AccessTokenIntrospectionSubjectClaims []string
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    AccessTokenIntrospectionSubjectsAlloweds []string
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    AccessTokenIntrospectionTimeout float64
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    AccessTokenIssuer string
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    AccessTokenIssuerClaims []string
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    AccessTokenIssuersAlloweds []string
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    AccessTokenJwksUri string
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    AccessTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    AccessTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    AccessTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    AccessTokenJwksUriRotatePeriod float64
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    AccessTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    AccessTokenKeysetClientCertificate GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    AccessTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    AccessTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    AccessTokenKeysetRotatePeriod float64
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    AccessTokenLeeway float64
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    AccessTokenNotbeforeClaims []string
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    AccessTokenOptional bool
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    AccessTokenOptionalClaims [][]string
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenRequestHeader string
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    AccessTokenRequiredClaims [][]string
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    AccessTokenScopesClaims []string
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    AccessTokenScopesRequireds []string
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    AccessTokenSigning bool
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    AccessTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    AccessTokenSubjectClaims []string
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    AccessTokenSubjectsAlloweds []string
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    AccessTokenUpstreamHeader string
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    AccessTokenUpstreamLeeway float64
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    AddAccessTokenClaims map[string]string
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    AddChannelTokenClaims map[string]string
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    AddClaims map[string]string
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    CacheAccessTokenIntrospection bool
    Whether to cache access token introspection results. Default: true
    CacheChannelTokenIntrospection bool
    Whether to cache channel token introspection results. Default: true
    ChannelTokenAudienceClaims []string
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    ChannelTokenAudiencesAlloweds []string
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    ChannelTokenConsumerBies []string
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    ChannelTokenConsumerClaims []string
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    ChannelTokenExpiryClaims []string
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    ChannelTokenIntrospectionAudienceClaims []string
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    ChannelTokenIntrospectionAudiencesAlloweds []string
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    ChannelTokenIntrospectionAuthorization string
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    ChannelTokenIntrospectionBodyArgs string
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    ChannelTokenIntrospectionConsumerBies []string
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    ChannelTokenIntrospectionConsumerClaims []string
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    ChannelTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    ChannelTokenIntrospectionExpiryClaims []string
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    ChannelTokenIntrospectionHint string
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    ChannelTokenIntrospectionIssuerClaims []string
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    ChannelTokenIntrospectionIssuersAlloweds []string
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    ChannelTokenIntrospectionJwtClaims []string
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    ChannelTokenIntrospectionLeeway float64
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    ChannelTokenIntrospectionNotbeforeClaims []string
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    ChannelTokenIntrospectionOptionalClaims [][]string
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenIntrospectionRequiredClaims [][]string
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenIntrospectionScopesClaims []string
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    ChannelTokenIntrospectionScopesRequireds []string
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    ChannelTokenIntrospectionSubjectClaims []string
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    ChannelTokenIntrospectionSubjectsAlloweds []string
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    ChannelTokenIntrospectionTimeout float64
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    ChannelTokenIssuer string
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    ChannelTokenIssuerClaims []string
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    ChannelTokenIssuersAlloweds []string
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    ChannelTokenJwksUri string
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    ChannelTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    ChannelTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    ChannelTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    ChannelTokenJwksUriRotatePeriod float64
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    ChannelTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    ChannelTokenKeysetClientCertificate GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    ChannelTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    ChannelTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    ChannelTokenKeysetRotatePeriod float64
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    ChannelTokenLeeway float64
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    ChannelTokenNotbeforeClaims []string
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    ChannelTokenOptional bool
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    ChannelTokenOptionalClaims [][]string
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenRequestHeader string
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    ChannelTokenRequiredClaims [][]string
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    ChannelTokenScopesClaims []string
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    ChannelTokenScopesRequireds []string
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    ChannelTokenSigning bool
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    ChannelTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    ChannelTokenSubjectClaims []string
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    ChannelTokenSubjectsAlloweds []string
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    ChannelTokenUpstreamHeader string
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    ChannelTokenUpstreamLeeway float64
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    EnableAccessTokenIntrospection bool
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    EnableChannelTokenIntrospection bool
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    EnableHsSignatures bool
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    EnableInstrumentation bool
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    OriginalAccessTokenUpstreamHeader string
    The HTTP header name used to store the original access token.
    OriginalChannelTokenUpstreamHeader string
    The HTTP header name used to store the original channel token.
    Realm string
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    RemoveAccessTokenClaims []string
    remove claims. It should be an array, and each element is a claim key string. Default: []
    RemoveChannelTokenClaims []string
    remove claims. It should be an array, and each element is a claim key string. Default: []
    SetAccessTokenClaims map[string]string
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    SetChannelTokenClaims map[string]string
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    SetClaims map[string]string
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    TrustAccessTokenIntrospection bool
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    TrustChannelTokenIntrospection bool
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    VerifyAccessTokenAudience bool
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    VerifyAccessTokenExpiry bool
    Quickly turn access token expiry verification off and on as needed. Default: true
    VerifyAccessTokenIntrospectionAudience bool
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    VerifyAccessTokenIntrospectionExpiry bool
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    VerifyAccessTokenIntrospectionIssuer bool
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    VerifyAccessTokenIntrospectionNotbefore bool
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    VerifyAccessTokenIntrospectionScopes bool
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    VerifyAccessTokenIntrospectionSubject bool
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    VerifyAccessTokenIssuer bool
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    VerifyAccessTokenNotbefore bool
    Quickly turn off and on the access token notbefore verification. Default: false
    VerifyAccessTokenScopes bool
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    VerifyAccessTokenSignature bool
    Quickly turn access token signature verification off and on as needed. Default: true
    VerifyAccessTokenSubject bool
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    VerifyChannelTokenAudience bool
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    VerifyChannelTokenExpiry bool
    Default: true
    VerifyChannelTokenIntrospectionAudience bool
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    VerifyChannelTokenIntrospectionExpiry bool
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    VerifyChannelTokenIntrospectionIssuer bool
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    VerifyChannelTokenIntrospectionNotbefore bool
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    VerifyChannelTokenIntrospectionScopes bool
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    VerifyChannelTokenIntrospectionSubject bool
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    VerifyChannelTokenIssuer bool
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    VerifyChannelTokenNotbefore bool
    Quickly turn off and on the channel token notbefore verification. Default: false
    VerifyChannelTokenScopes bool
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    VerifyChannelTokenSignature bool
    Quickly turn on/off the channel token signature verification. Default: true
    VerifyChannelTokenSubject bool
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true
    accessTokenAudienceClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    accessTokenAudiencesAlloweds List<String>
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    accessTokenConsumerBies List<String>
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    accessTokenConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    accessTokenExpiryClaims List<String>
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionAudienceClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    accessTokenIntrospectionAudiencesAlloweds List<String>
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    accessTokenIntrospectionAuthorization String
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    accessTokenIntrospectionBodyArgs String
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    accessTokenIntrospectionConsumerBies List<String>
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    accessTokenIntrospectionConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    accessTokenIntrospectionEndpoint String
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    accessTokenIntrospectionExpiryClaims List<String>
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionHint String
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    accessTokenIntrospectionIssuerClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    accessTokenIntrospectionIssuersAlloweds List<String>
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    accessTokenIntrospectionJwtClaims List<String>
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    accessTokenIntrospectionLeeway Double
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    accessTokenIntrospectionNotbeforeClaims List<String>
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenIntrospectionOptionalClaims List<List<String>>
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionRequiredClaims List<List<String>>
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionScopesClaims List<String>
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    accessTokenIntrospectionScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    accessTokenIntrospectionSubjectClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    accessTokenIntrospectionSubjectsAlloweds List<String>
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    accessTokenIntrospectionTimeout Double
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    accessTokenIssuer String
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    accessTokenIssuerClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    accessTokenIssuersAlloweds List<String>
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    accessTokenJwksUri String
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    accessTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    accessTokenJwksUriClientPassword String
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    accessTokenJwksUriClientUsername String
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    accessTokenJwksUriRotatePeriod Double
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    accessTokenKeyset String
    The name of the keyset containing signing keys. Default: "kong"
    accessTokenKeysetClientCertificate GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    accessTokenKeysetClientPassword String
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    accessTokenKeysetClientUsername String
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    accessTokenKeysetRotatePeriod Double
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    accessTokenLeeway Double
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    accessTokenNotbeforeClaims List<String>
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenOptional Boolean
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    accessTokenOptionalClaims List<List<String>>
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenRequestHeader String
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    accessTokenRequiredClaims List<List<String>>
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenScopesClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    accessTokenScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    accessTokenSigning Boolean
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    accessTokenSigningAlgorithm String
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    accessTokenSubjectClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    accessTokenSubjectsAlloweds List<String>
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    accessTokenUpstreamHeader String
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    accessTokenUpstreamLeeway Double
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    addAccessTokenClaims Map<String,String>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addChannelTokenClaims Map<String,String>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addClaims Map<String,String>
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    cacheAccessTokenIntrospection Boolean
    Whether to cache access token introspection results. Default: true
    cacheChannelTokenIntrospection Boolean
    Whether to cache channel token introspection results. Default: true
    channelTokenAudienceClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    channelTokenAudiencesAlloweds List<String>
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    channelTokenConsumerBies List<String>
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    channelTokenConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    channelTokenExpiryClaims List<String>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionAudienceClaims List<String>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    channelTokenIntrospectionAudiencesAlloweds List<String>
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    channelTokenIntrospectionAuthorization String
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    channelTokenIntrospectionBodyArgs String
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    channelTokenIntrospectionConsumerBies List<String>
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    channelTokenIntrospectionConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    channelTokenIntrospectionEndpoint String
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    channelTokenIntrospectionExpiryClaims List<String>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionHint String
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    channelTokenIntrospectionIssuerClaims List<String>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    channelTokenIntrospectionIssuersAlloweds List<String>
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    channelTokenIntrospectionJwtClaims List<String>
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    channelTokenIntrospectionLeeway Double
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    channelTokenIntrospectionNotbeforeClaims List<String>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenIntrospectionOptionalClaims List<List<String>>
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionRequiredClaims List<List<String>>
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionScopesClaims List<String>
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenIntrospectionScopesRequireds List<String>
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    channelTokenIntrospectionSubjectClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    channelTokenIntrospectionSubjectsAlloweds List<String>
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    channelTokenIntrospectionTimeout Double
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    channelTokenIssuer String
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    channelTokenIssuerClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    channelTokenIssuersAlloweds List<String>
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    channelTokenJwksUri String
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    channelTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    channelTokenJwksUriClientPassword String
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    channelTokenJwksUriClientUsername String
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    channelTokenJwksUriRotatePeriod Double
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    channelTokenKeyset String
    The name of the keyset containing signing keys. Default: "kong"
    channelTokenKeysetClientCertificate GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    channelTokenKeysetClientPassword String
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    channelTokenKeysetClientUsername String
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    channelTokenKeysetRotatePeriod Double
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    channelTokenLeeway Double
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    channelTokenNotbeforeClaims List<String>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenOptional Boolean
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    channelTokenOptionalClaims List<List<String>>
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenRequestHeader String
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    channelTokenRequiredClaims List<List<String>>
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenScopesClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    channelTokenSigning Boolean
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    channelTokenSigningAlgorithm String
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    channelTokenSubjectClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    channelTokenSubjectsAlloweds List<String>
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    channelTokenUpstreamHeader String
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    channelTokenUpstreamLeeway Double
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    enableAccessTokenIntrospection Boolean
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    enableChannelTokenIntrospection Boolean
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    enableHsSignatures Boolean
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    enableInstrumentation Boolean
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    originalAccessTokenUpstreamHeader String
    The HTTP header name used to store the original access token.
    originalChannelTokenUpstreamHeader String
    The HTTP header name used to store the original channel token.
    realm String
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    removeAccessTokenClaims List<String>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    removeChannelTokenClaims List<String>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    setAccessTokenClaims Map<String,String>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setChannelTokenClaims Map<String,String>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setClaims Map<String,String>
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    trustAccessTokenIntrospection Boolean
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    trustChannelTokenIntrospection Boolean
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    verifyAccessTokenAudience Boolean
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    verifyAccessTokenExpiry Boolean
    Quickly turn access token expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionAudience Boolean
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    verifyAccessTokenIntrospectionExpiry Boolean
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionIssuer Boolean
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    verifyAccessTokenIntrospectionNotbefore Boolean
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    verifyAccessTokenIntrospectionScopes Boolean
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    verifyAccessTokenIntrospectionSubject Boolean
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    verifyAccessTokenIssuer Boolean
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    verifyAccessTokenNotbefore Boolean
    Quickly turn off and on the access token notbefore verification. Default: false
    verifyAccessTokenScopes Boolean
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    verifyAccessTokenSignature Boolean
    Quickly turn access token signature verification off and on as needed. Default: true
    verifyAccessTokenSubject Boolean
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    verifyChannelTokenAudience Boolean
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    verifyChannelTokenExpiry Boolean
    Default: true
    verifyChannelTokenIntrospectionAudience Boolean
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    verifyChannelTokenIntrospectionExpiry Boolean
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    verifyChannelTokenIntrospectionIssuer Boolean
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    verifyChannelTokenIntrospectionNotbefore Boolean
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    verifyChannelTokenIntrospectionScopes Boolean
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    verifyChannelTokenIntrospectionSubject Boolean
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    verifyChannelTokenIssuer Boolean
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    verifyChannelTokenNotbefore Boolean
    Quickly turn off and on the channel token notbefore verification. Default: false
    verifyChannelTokenScopes Boolean
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    verifyChannelTokenSignature Boolean
    Quickly turn on/off the channel token signature verification. Default: true
    verifyChannelTokenSubject Boolean
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true
    accessTokenAudienceClaims string[]
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    accessTokenAudiencesAlloweds string[]
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    accessTokenConsumerBies string[]
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    accessTokenConsumerClaims string[]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    accessTokenExpiryClaims string[]
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionAudienceClaims string[]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    accessTokenIntrospectionAudiencesAlloweds string[]
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    accessTokenIntrospectionAuthorization string
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    accessTokenIntrospectionBodyArgs string
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    accessTokenIntrospectionConsumerBies string[]
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    accessTokenIntrospectionConsumerClaims string[]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    accessTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    accessTokenIntrospectionExpiryClaims string[]
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionHint string
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    accessTokenIntrospectionIssuerClaims string[]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    accessTokenIntrospectionIssuersAlloweds string[]
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    accessTokenIntrospectionJwtClaims string[]
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    accessTokenIntrospectionLeeway number
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    accessTokenIntrospectionNotbeforeClaims string[]
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenIntrospectionOptionalClaims string[][]
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionRequiredClaims string[][]
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionScopesClaims string[]
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    accessTokenIntrospectionScopesRequireds string[]
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    accessTokenIntrospectionSubjectClaims string[]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    accessTokenIntrospectionSubjectsAlloweds string[]
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    accessTokenIntrospectionTimeout number
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    accessTokenIssuer string
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    accessTokenIssuerClaims string[]
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    accessTokenIssuersAlloweds string[]
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    accessTokenJwksUri string
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    accessTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    accessTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    accessTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    accessTokenJwksUriRotatePeriod number
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    accessTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    accessTokenKeysetClientCertificate GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    accessTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    accessTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    accessTokenKeysetRotatePeriod number
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    accessTokenLeeway number
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    accessTokenNotbeforeClaims string[]
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenOptional boolean
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    accessTokenOptionalClaims string[][]
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenRequestHeader string
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    accessTokenRequiredClaims string[][]
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenScopesClaims string[]
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    accessTokenScopesRequireds string[]
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    accessTokenSigning boolean
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    accessTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    accessTokenSubjectClaims string[]
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    accessTokenSubjectsAlloweds string[]
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    accessTokenUpstreamHeader string
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    accessTokenUpstreamLeeway number
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    addAccessTokenClaims {[key: string]: string}
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addChannelTokenClaims {[key: string]: string}
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addClaims {[key: string]: string}
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    cacheAccessTokenIntrospection boolean
    Whether to cache access token introspection results. Default: true
    cacheChannelTokenIntrospection boolean
    Whether to cache channel token introspection results. Default: true
    channelTokenAudienceClaims string[]
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    channelTokenAudiencesAlloweds string[]
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    channelTokenConsumerBies string[]
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    channelTokenConsumerClaims string[]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    channelTokenExpiryClaims string[]
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionAudienceClaims string[]
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    channelTokenIntrospectionAudiencesAlloweds string[]
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    channelTokenIntrospectionAuthorization string
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    channelTokenIntrospectionBodyArgs string
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    channelTokenIntrospectionConsumerBies string[]
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    channelTokenIntrospectionConsumerClaims string[]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    channelTokenIntrospectionEndpoint string
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    channelTokenIntrospectionExpiryClaims string[]
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionHint string
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    channelTokenIntrospectionIssuerClaims string[]
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    channelTokenIntrospectionIssuersAlloweds string[]
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    channelTokenIntrospectionJwtClaims string[]
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    channelTokenIntrospectionLeeway number
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    channelTokenIntrospectionNotbeforeClaims string[]
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenIntrospectionOptionalClaims string[][]
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionRequiredClaims string[][]
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionScopesClaims string[]
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenIntrospectionScopesRequireds string[]
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    channelTokenIntrospectionSubjectClaims string[]
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    channelTokenIntrospectionSubjectsAlloweds string[]
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    channelTokenIntrospectionTimeout number
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    channelTokenIssuer string
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    channelTokenIssuerClaims string[]
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    channelTokenIssuersAlloweds string[]
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    channelTokenJwksUri string
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    channelTokenJwksUriClientCertificate GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    channelTokenJwksUriClientPassword string
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    channelTokenJwksUriClientUsername string
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    channelTokenJwksUriRotatePeriod number
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    channelTokenKeyset string
    The name of the keyset containing signing keys. Default: "kong"
    channelTokenKeysetClientCertificate GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    channelTokenKeysetClientPassword string
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    channelTokenKeysetClientUsername string
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    channelTokenKeysetRotatePeriod number
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    channelTokenLeeway number
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    channelTokenNotbeforeClaims string[]
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenOptional boolean
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    channelTokenOptionalClaims string[][]
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenRequestHeader string
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    channelTokenRequiredClaims string[][]
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenScopesClaims string[]
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenScopesRequireds string[]
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    channelTokenSigning boolean
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    channelTokenSigningAlgorithm string
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    channelTokenSubjectClaims string[]
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    channelTokenSubjectsAlloweds string[]
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    channelTokenUpstreamHeader string
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    channelTokenUpstreamLeeway number
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    enableAccessTokenIntrospection boolean
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    enableChannelTokenIntrospection boolean
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    enableHsSignatures boolean
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    enableInstrumentation boolean
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    originalAccessTokenUpstreamHeader string
    The HTTP header name used to store the original access token.
    originalChannelTokenUpstreamHeader string
    The HTTP header name used to store the original channel token.
    realm string
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    removeAccessTokenClaims string[]
    remove claims. It should be an array, and each element is a claim key string. Default: []
    removeChannelTokenClaims string[]
    remove claims. It should be an array, and each element is a claim key string. Default: []
    setAccessTokenClaims {[key: string]: string}
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setChannelTokenClaims {[key: string]: string}
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setClaims {[key: string]: string}
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    trustAccessTokenIntrospection boolean
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    trustChannelTokenIntrospection boolean
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    verifyAccessTokenAudience boolean
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    verifyAccessTokenExpiry boolean
    Quickly turn access token expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionAudience boolean
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    verifyAccessTokenIntrospectionExpiry boolean
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionIssuer boolean
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    verifyAccessTokenIntrospectionNotbefore boolean
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    verifyAccessTokenIntrospectionScopes boolean
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    verifyAccessTokenIntrospectionSubject boolean
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    verifyAccessTokenIssuer boolean
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    verifyAccessTokenNotbefore boolean
    Quickly turn off and on the access token notbefore verification. Default: false
    verifyAccessTokenScopes boolean
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    verifyAccessTokenSignature boolean
    Quickly turn access token signature verification off and on as needed. Default: true
    verifyAccessTokenSubject boolean
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    verifyChannelTokenAudience boolean
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    verifyChannelTokenExpiry boolean
    Default: true
    verifyChannelTokenIntrospectionAudience boolean
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    verifyChannelTokenIntrospectionExpiry boolean
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    verifyChannelTokenIntrospectionIssuer boolean
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    verifyChannelTokenIntrospectionNotbefore boolean
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    verifyChannelTokenIntrospectionScopes boolean
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    verifyChannelTokenIntrospectionSubject boolean
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    verifyChannelTokenIssuer boolean
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    verifyChannelTokenNotbefore boolean
    Quickly turn off and on the channel token notbefore verification. Default: false
    verifyChannelTokenScopes boolean
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    verifyChannelTokenSignature boolean
    Quickly turn on/off the channel token signature verification. Default: true
    verifyChannelTokenSubject boolean
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true
    access_token_audience_claims Sequence[str]
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    access_token_audiences_alloweds Sequence[str]
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    access_token_consumer_bies Sequence[str]
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    access_token_consumer_claims Sequence[str]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    access_token_expiry_claims Sequence[str]
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    access_token_introspection_audience_claims Sequence[str]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    access_token_introspection_audiences_alloweds Sequence[str]
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    access_token_introspection_authorization str
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    access_token_introspection_body_args str
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    access_token_introspection_consumer_bies Sequence[str]
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    access_token_introspection_consumer_claims Sequence[str]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    access_token_introspection_endpoint str
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    access_token_introspection_expiry_claims Sequence[str]
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    access_token_introspection_hint str
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    access_token_introspection_issuer_claims Sequence[str]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    access_token_introspection_issuers_alloweds Sequence[str]
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    access_token_introspection_jwt_claims Sequence[str]
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    access_token_introspection_leeway float
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    access_token_introspection_notbefore_claims Sequence[str]
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    access_token_introspection_optional_claims Sequence[Sequence[str]]
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    access_token_introspection_required_claims Sequence[Sequence[str]]
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    access_token_introspection_scopes_claims Sequence[str]
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    access_token_introspection_scopes_requireds Sequence[str]
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    access_token_introspection_subject_claims Sequence[str]
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    access_token_introspection_subjects_alloweds Sequence[str]
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    access_token_introspection_timeout float
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    access_token_issuer str
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    access_token_issuer_claims Sequence[str]
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    access_token_issuers_alloweds Sequence[str]
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    access_token_jwks_uri str
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    access_token_jwks_uri_client_certificate GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    access_token_jwks_uri_client_password str
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    access_token_jwks_uri_client_username str
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    access_token_jwks_uri_rotate_period float
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    access_token_keyset str
    The name of the keyset containing signing keys. Default: "kong"
    access_token_keyset_client_certificate GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    access_token_keyset_client_password str
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    access_token_keyset_client_username str
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    access_token_keyset_rotate_period float
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    access_token_leeway float
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    access_token_notbefore_claims Sequence[str]
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    access_token_optional bool
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    access_token_optional_claims Sequence[Sequence[str]]
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    access_token_request_header str
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    access_token_required_claims Sequence[Sequence[str]]
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    access_token_scopes_claims Sequence[str]
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    access_token_scopes_requireds Sequence[str]
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    access_token_signing bool
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    access_token_signing_algorithm str
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    access_token_subject_claims Sequence[str]
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    access_token_subjects_alloweds Sequence[str]
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    access_token_upstream_header str
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    access_token_upstream_leeway float
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    add_access_token_claims Mapping[str, str]
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    add_channel_token_claims Mapping[str, str]
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    add_claims Mapping[str, str]
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    cache_access_token_introspection bool
    Whether to cache access token introspection results. Default: true
    cache_channel_token_introspection bool
    Whether to cache channel token introspection results. Default: true
    channel_token_audience_claims Sequence[str]
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    channel_token_audiences_alloweds Sequence[str]
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    channel_token_consumer_bies Sequence[str]
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    channel_token_consumer_claims Sequence[str]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    channel_token_expiry_claims Sequence[str]
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channel_token_introspection_audience_claims Sequence[str]
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    channel_token_introspection_audiences_alloweds Sequence[str]
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    channel_token_introspection_authorization str
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    channel_token_introspection_body_args str
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    channel_token_introspection_consumer_bies Sequence[str]
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    channel_token_introspection_consumer_claims Sequence[str]
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    channel_token_introspection_endpoint str
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    channel_token_introspection_expiry_claims Sequence[str]
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channel_token_introspection_hint str
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    channel_token_introspection_issuer_claims Sequence[str]
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    channel_token_introspection_issuers_alloweds Sequence[str]
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    channel_token_introspection_jwt_claims Sequence[str]
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    channel_token_introspection_leeway float
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    channel_token_introspection_notbefore_claims Sequence[str]
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channel_token_introspection_optional_claims Sequence[Sequence[str]]
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channel_token_introspection_required_claims Sequence[Sequence[str]]
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channel_token_introspection_scopes_claims Sequence[str]
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    channel_token_introspection_scopes_requireds Sequence[str]
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    channel_token_introspection_subject_claims Sequence[str]
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    channel_token_introspection_subjects_alloweds Sequence[str]
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    channel_token_introspection_timeout float
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    channel_token_issuer str
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    channel_token_issuer_claims Sequence[str]
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    channel_token_issuers_alloweds Sequence[str]
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    channel_token_jwks_uri str
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    channel_token_jwks_uri_client_certificate GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    channel_token_jwks_uri_client_password str
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    channel_token_jwks_uri_client_username str
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    channel_token_jwks_uri_rotate_period float
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    channel_token_keyset str
    The name of the keyset containing signing keys. Default: "kong"
    channel_token_keyset_client_certificate GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    channel_token_keyset_client_password str
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    channel_token_keyset_client_username str
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    channel_token_keyset_rotate_period float
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    channel_token_leeway float
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    channel_token_notbefore_claims Sequence[str]
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channel_token_optional bool
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    channel_token_optional_claims Sequence[Sequence[str]]
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channel_token_request_header str
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    channel_token_required_claims Sequence[Sequence[str]]
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channel_token_scopes_claims Sequence[str]
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    channel_token_scopes_requireds Sequence[str]
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    channel_token_signing bool
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    channel_token_signing_algorithm str
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    channel_token_subject_claims Sequence[str]
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    channel_token_subjects_alloweds Sequence[str]
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    channel_token_upstream_header str
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    channel_token_upstream_leeway float
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    enable_access_token_introspection bool
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    enable_channel_token_introspection bool
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    enable_hs_signatures bool
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    enable_instrumentation bool
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    original_access_token_upstream_header str
    The HTTP header name used to store the original access token.
    original_channel_token_upstream_header str
    The HTTP header name used to store the original channel token.
    realm str
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    remove_access_token_claims Sequence[str]
    remove claims. It should be an array, and each element is a claim key string. Default: []
    remove_channel_token_claims Sequence[str]
    remove claims. It should be an array, and each element is a claim key string. Default: []
    set_access_token_claims Mapping[str, str]
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    set_channel_token_claims Mapping[str, str]
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    set_claims Mapping[str, str]
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    trust_access_token_introspection bool
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    trust_channel_token_introspection bool
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    verify_access_token_audience bool
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    verify_access_token_expiry bool
    Quickly turn access token expiry verification off and on as needed. Default: true
    verify_access_token_introspection_audience bool
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    verify_access_token_introspection_expiry bool
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    verify_access_token_introspection_issuer bool
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    verify_access_token_introspection_notbefore bool
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    verify_access_token_introspection_scopes bool
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    verify_access_token_introspection_subject bool
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    verify_access_token_issuer bool
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    verify_access_token_notbefore bool
    Quickly turn off and on the access token notbefore verification. Default: false
    verify_access_token_scopes bool
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    verify_access_token_signature bool
    Quickly turn access token signature verification off and on as needed. Default: true
    verify_access_token_subject bool
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    verify_channel_token_audience bool
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    verify_channel_token_expiry bool
    Default: true
    verify_channel_token_introspection_audience bool
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    verify_channel_token_introspection_expiry bool
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    verify_channel_token_introspection_issuer bool
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    verify_channel_token_introspection_notbefore bool
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    verify_channel_token_introspection_scopes bool
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    verify_channel_token_introspection_subject bool
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    verify_channel_token_issuer bool
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    verify_channel_token_notbefore bool
    Quickly turn off and on the channel token notbefore verification. Default: false
    verify_channel_token_scopes bool
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    verify_channel_token_signature bool
    Quickly turn on/off the channel token signature verification. Default: true
    verify_channel_token_subject bool
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true
    accessTokenAudienceClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_audiences_allowed. Default: ["aud"]
    accessTokenAudiencesAlloweds List<String>
    The audiences allowed to be present in the access token claim specified by config.access_token_audience_claim.
    accessTokenConsumerBies List<String>
    When the plugin tries to apply an access token to a Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of alues. Valid values are id, username, and custom_id. Default: ["custom_id","username"]
    accessTokenConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (for example, sub or username) in an access token to Kong consumer entity.
    accessTokenExpiryClaims List<String>
    Specify the expiry claim in an access token to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionAudienceClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_audiences_allowed. Default: ["aud"]
    accessTokenIntrospectionAudiencesAlloweds List<String>
    The audiences allowed to be present in the access token introspection claim specified by config.access_token_introspection_audience_claim.
    accessTokenIntrospectionAuthorization String
    If the introspection endpoint requires client authentication (client being the JWT Signer plugin), you can specify the Authorization header's value with this configuration parameter.
    accessTokenIntrospectionBodyArgs String
    This parameter allows you to pass URL encoded request body arguments. For example: resource= or a=1&b=&c.
    accessTokenIntrospectionConsumerBies List<String>
    When the plugin tries to do access token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Default: ["custom_id","username"]
    accessTokenIntrospectionConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in access token introspection results to the Kong consumer entity.
    accessTokenIntrospectionEndpoint String
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter.
    accessTokenIntrospectionExpiryClaims List<String>
    Specify the expiry claim in an access token introspection to verify if the default exp is not used. Default: ["exp"]
    accessTokenIntrospectionHint String
    If you need to give hint parameter when introspecting an access token, use this parameter to specify the value. By default, the plugin sends hint=access_token. Default: "access_token"
    accessTokenIntrospectionIssuerClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_issuers_allowed. Default: ["iss"]
    accessTokenIntrospectionIssuersAlloweds List<String>
    The issuers allowed to be present in the access token introspection claim specified by config.access_token_introspection_issuer_claim.
    accessTokenIntrospectionJwtClaims List<String>
    If your introspection endpoint returns an access token in one of the keys (or claims) within the introspection results (JSON). If the key cannot be found, the plugin responds with 401 Unauthorized. Also if the key is found but cannot be decoded as JWT, it also responds with 401 Unauthorized.
    accessTokenIntrospectionLeeway Number
    Adjusts clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time in seconds. You can disable access token introspection expiry verification altogether with config.verify_access_token_introspection_expiry. Default: 0
    accessTokenIntrospectionNotbeforeClaims List<String>
    Specify the notbefore claim in an access token introspection to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenIntrospectionOptionalClaims List<List<String>>
    Specify the optional claims of the access token introspection result. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionRequiredClaims List<List<String>>
    Specify the required claims that must be present in the access token introspection result. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenIntrospectionScopesClaims List<String>
    Specify the claim/property in access token introspection results (JSON) to be verified against values of config.access_token_introspection_scopes_required. This supports nested claims. For example, with Keycloak you could use [ "realm_access", "roles" ], hich can be given as realm_access,roles (form post). If the claim is not found in access token introspection results, and you have specified config.access_token_introspection_scopes_required, the plugin responds with 403 Forbidden. Default: ["scope"]
    accessTokenIntrospectionScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by an introspection claim/property specified by config.access_token_introspection_scopes_claim.
    accessTokenIntrospectionSubjectClaims List<String>
    Specify the claim in an access token introspection to verify against values of config.access_token_introspection_subjects_allowed. Default: ["sub"]
    accessTokenIntrospectionSubjectsAlloweds List<String>
    The subjects allowed to be present in the access token introspection claim specified by config.access_token_introspection_subject_claim.
    accessTokenIntrospectionTimeout Number
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on access token introspection.
    accessTokenIssuer String
    The iss claim of a signed or re-signed access token is set to this value. Original iss claim of the incoming token (possibly introspected) is stored in original_iss claim of the newly signed access token. Default: "kong"
    accessTokenIssuerClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_issuers_allowed. Default: ["iss"]
    accessTokenIssuersAlloweds List<String>
    The issuers allowed to be present in the access token claim specified by config.access_token_issuer_claim.
    accessTokenJwksUri String
    Specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the access token.
    accessTokenJwksUriClientCertificate Property Map
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    accessTokenJwksUriClientPassword String
    The client password that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_username
    accessTokenJwksUriClientUsername String
    The client username that will be used to authenticate Kong if access_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with access_token_jwks_uri_client_password
    accessTokenJwksUriRotatePeriod Number
    Specify the period (in seconds) to auto-rotate the jwks for access_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    accessTokenKeyset String
    The name of the keyset containing signing keys. Default: "kong"
    accessTokenKeysetClientCertificate Property Map
    The client certificate that will be used to authenticate Kong if access_token_keyset is an https uri that requires mTLS Auth.
    accessTokenKeysetClientPassword String
    The client password that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_username
    accessTokenKeysetClientUsername String
    The client username that will be used to authenticate Kong if access_token_keyset is a uri that requires Basic Auth. Should be configured together with access_token_keyset_client_password
    accessTokenKeysetRotatePeriod Number
    Specify the period (in seconds) to auto-rotate the jwks for access_token_keyset. The default value 0 means no auto-rotation. Default: 0
    accessTokenLeeway Number
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to the token's exp claim before checking token expiry against Kong servers' current time in seconds. You can disable access token expiry verification altogether with config.verify_access_token_expiry. Default: 0
    accessTokenNotbeforeClaims List<String>
    Specify the notbefore claim in an access token to verify if the default nbf is not used. Default: ["nbf"]
    accessTokenOptional Boolean
    If an access token is not provided or no config.access_token_request_header is specified, the plugin cannot verify the access token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Use this parameter to allow the request to proceed even when there is no token to check. If the token is provided, then this parameter has no effect. Default: false
    accessTokenOptionalClaims List<List<String>>
    Specify the optional claims of the access token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenRequestHeader String
    This parameter tells the name of the header where to look for the access token. Default: "Authorization"
    accessTokenRequiredClaims List<List<String>>
    Specify the required claims that must be present in the access token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    accessTokenScopesClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_scopes_required. Default: ["scope"]
    accessTokenScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by a claim specified by config.access_token_scopes_claim.
    accessTokenSigning Boolean
    Quickly turn access token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    accessTokenSigningAlgorithm String
    When this plugin sets the upstream header as specified with config.access_token_upstream_header, re-signs the original access token using the private keys of the JWT Signer plugin. Specify the algorithm that is used to sign the token. The config.access_token_issuer specifies which keyset is used to sign the new token issued by Kong using the specified signing algorithm. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    accessTokenSubjectClaims List<String>
    Specify the claim in an access token to verify against values of config.access_token_subjects_allowed. Default: ["sub"]
    accessTokenSubjectsAlloweds List<String>
    The subjects allowed to be present in the access token claim specified by config.access_token_subject_claim.
    accessTokenUpstreamHeader String
    Removes the config.access_token_request_header from the request after reading its value. With config.access_token_upstream_header, you can specify the upstream header where the plugin adds the Kong signed token. If you don't specify a value, such as use null or "" (empty string), the plugin does not even try to sign or re-sign the token. Default: "Authorization:Bearer"
    accessTokenUpstreamLeeway Number
    If you want to add or subtract (using a negative value) expiry time (in seconds) of the original access token, you can specify a value that is added to the original access token's exp claim. Default: 0
    addAccessTokenClaims Map<String>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addChannelTokenClaims Map<String>
    Add customized claims if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    addClaims Map<String>
    Add customized claims to both tokens if they are not present yet. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    cacheAccessTokenIntrospection Boolean
    Whether to cache access token introspection results. Default: true
    cacheChannelTokenIntrospection Boolean
    Whether to cache channel token introspection results. Default: true
    channelTokenAudienceClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_audiences_allowed. Default: ["aud"]
    channelTokenAudiencesAlloweds List<String>
    The audiences allowed to be present in the channel token claim specified by config.channel_token_audience_claim.
    channelTokenConsumerBies List<String>
    When the plugin tries to do channel token to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of valid values: id, username, and custom_id. Default: ["custom_id","username"]
    channelTokenConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter. Kong consumers have an id, a username, and a custom_id. If this parameter is enabled but the mapping fails, such as when there's a non-existent Kong consumer, the plugin responds with 403 Forbidden.
    channelTokenExpiryClaims List<String>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionAudienceClaims List<String>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_audiences_allowed. Default: ["aud"]
    channelTokenIntrospectionAudiencesAlloweds List<String>
    The audiences allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_audience_claim.
    channelTokenIntrospectionAuthorization String
    When using opaque channel tokens, and you want to turn on channel token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise the plugin will not try introspection, and instead returns 401 Unauthorized when using opaque channel tokens.
    channelTokenIntrospectionBodyArgs String
    If you need to pass additional body arguments to introspection endpoint when the plugin introspects the opaque channel token, you can use this config parameter to specify them. You should URL encode the value. For example: resource= or a=1&b=&c.
    channelTokenIntrospectionConsumerBies List<String>
    When the plugin tries to do channel token introspection results to Kong consumer mapping, it tries to find a matching Kong consumer from properties defined using this configuration parameter. The parameter can take an array of values. Valid values are id, username and custom_id. Default: ["custom_id","username"]
    channelTokenIntrospectionConsumerClaims List<String>
    When you set a value for this parameter, the plugin tries to map an arbitrary claim specified with this configuration parameter (such as sub or username) in channel token introspection results to Kong consumer entity
    channelTokenIntrospectionEndpoint String
    When you use opaque access tokens and you want to turn on access token introspection, you need to specify the OAuth 2.0 introspection endpoint URI with this configuration parameter. Otherwise, the plugin does not try introspection and returns 401 Unauthorized instead.
    channelTokenIntrospectionExpiryClaims List<String>
    Specify the expiry claim in a channel token to verify if the default exp is not used. Default: ["exp"]
    channelTokenIntrospectionHint String
    If you need to give hint parameter when introspecting a channel token, you can use this parameter to specify the value of such parameter. By default, a hint isn't sent with channel token introspection.
    channelTokenIntrospectionIssuerClaims List<String>
    Specify the claim in a channel token introspection to verify against values of config.channel_token_introspection_issuers_allowed. Default: ["iss"]
    channelTokenIntrospectionIssuersAlloweds List<String>
    The issuers allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_issuer_claim.
    channelTokenIntrospectionJwtClaims List<String>
    If your introspection endpoint returns a channel token in one of the keys (or claims) in the introspection results (JSON), the plugin can use that value instead of the introspection results when doing expiry verification and signing of the new token issued by Kong.
    channelTokenIntrospectionLeeway Number
    You can use this parameter to adjust clock skew between the token issuer introspection results and Kong. The value will be used to time-related claim verification. For example, it will be added to introspection results (JSON) exp claim/property before checking token expiry against Kong servers current time (in seconds). You can disable channel token introspection expiry verification altogether with config.verify_channel_token_introspection_expiry. Default: 0
    channelTokenIntrospectionNotbeforeClaims List<String>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenIntrospectionOptionalClaims List<List<String>>
    Specify the optional claims of the channel token introspection. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionRequiredClaims List<List<String>>
    Specify the required claims that must be present in the channel token introspection. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenIntrospectionScopesClaims List<String>
    Use this parameter to specify the claim/property in channel token introspection results (JSON) to be verified against values of config.channel_token_introspection_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenIntrospectionScopesRequireds List<String>
    Use this parameter to specify the required values (or scopes) that are checked by an introspection claim/property specified by config.channel_token_introspection_scopes_claim.
    channelTokenIntrospectionSubjectClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_introspection_subjects_allowed. Default: ["sub"]
    channelTokenIntrospectionSubjectsAlloweds List<String>
    The subjects allowed to be present in the channel token introspection claim specified by config.channel_token_introspection_subject_claim.
    channelTokenIntrospectionTimeout Number
    Timeout in milliseconds for an introspection request. The plugin tries to introspect twice if the first request fails for some reason. If both requests timeout, then the plugin runs two times the config.access_token_introspection_timeout on channel token introspection.
    channelTokenIssuer String
    The iss claim of the re-signed channel token is set to this value, which is kong by default. The original iss claim of the incoming token (possibly introspected) is stored in the original_iss claim of the newly signed channel token. Default: "kong"
    channelTokenIssuerClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_issuers_allowed. Default: ["iss"]
    channelTokenIssuersAlloweds List<String>
    The issuers allowed to be present in the channel token claim specified by config.channel_token_issuer_claim.
    channelTokenJwksUri String
    If you want to use config.verify_channel_token_signature, you must specify the URI where the plugin can fetch the public keys (JWKS) to verify the signature of the channel token. If you don't specify a URI and you pass a JWT token to the plugin, then the plugin responds with 401 Unauthorized.
    channelTokenJwksUriClientCertificate Property Map
    The client certificate that will be used to authenticate Kong if access_token_jwks_uri is an https uri that requires mTLS Auth.
    channelTokenJwksUriClientPassword String
    The client password that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_username
    channelTokenJwksUriClientUsername String
    The client username that will be used to authenticate Kong if channel_token_jwks_uri is a uri that requires Basic Auth. Should be configured together with channel_token_jwks_uri_client_password
    channelTokenJwksUriRotatePeriod Number
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_jwks_uri. The default value 0 means no auto-rotation. Default: 0
    channelTokenKeyset String
    The name of the keyset containing signing keys. Default: "kong"
    channelTokenKeysetClientCertificate Property Map
    The client certificate that will be used to authenticate Kong if channel_token_keyset is an https uri that requires mTLS Auth.
    channelTokenKeysetClientPassword String
    The client password that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_username
    channelTokenKeysetClientUsername String
    The client username that will be used to authenticate Kong if channel_token_keyset is a uri that requires Basic Auth. Should be configured together with channel_token_keyset_client_password
    channelTokenKeysetRotatePeriod Number
    Specify the period (in seconds) to auto-rotate the jwks for channel_token_keyset. The default value 0 means no auto-rotation. Default: 0
    channelTokenLeeway Number
    Adjusts clock skew between the token issuer and Kong. The value will be used to time-related claim verification. For example, it will be added to token's exp claim before checking token expiry against Kong servers current time in seconds. You can disable channel token expiry verification altogether with config.verify_channel_token_expiry. Default: 0
    channelTokenNotbeforeClaims List<String>
    Specify the notbefore claim in a channel token to verify if the default nbf is not used. Default: ["nbf"]
    channelTokenOptional Boolean
    If a channel token is not provided or no config.channel_token_request_header is specified, the plugin cannot verify the channel token. In that case, the plugin normally responds with 401 Unauthorized (client didn't send a token) or 500 Unexpected (a configuration error). Enable this parameter to allow the request to proceed even when there is no channel token to check. If the channel token is provided, then this parameter has no effect. Default: false
    channelTokenOptionalClaims List<List<String>>
    Specify the optional claims of the channel token. These claims are only validated when they are present. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenRequestHeader String
    This parameter tells the name of the header where to look for the channel token. If you don't want to do anything with the channel token, then you can set this to null or "" (empty string).
    channelTokenRequiredClaims List<List<String>>
    Specify the required claims that must be present in the channel token. Every claim is specified by an array. If the array has multiple elements, it means the claim is inside a nested object of the payload.
    channelTokenScopesClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_scopes_required. This supports nested claims. Default: ["scope"]
    channelTokenScopesRequireds List<String>
    Specify the required values (or scopes) that are checked by a claim specified by config.channel_token_scopes_claim.
    channelTokenSigning Boolean
    Quickly turn channel token signing or re-signing off and on as needed. If turned off, the plugin will not send the signed or resigned token to the upstream. Default: true
    channelTokenSigningAlgorithm String
    When this plugin sets the upstream header as specified with config.channel_token_upstream_header, it also re-signs the original channel token using private keys of this plugin. Specify the algorithm that is used to sign the token. Default: "RS256"; must be one of ["ES256", "ES384", "ES512", "EdDSA", "HS256", "HS384", "HS512", "PS256", "PS384", "PS512", "RS256", "RS512"]
    channelTokenSubjectClaims List<String>
    Specify the claim in a channel token to verify against values of config.channel_token_subjects_allowed. Default: ["sub"]
    channelTokenSubjectsAlloweds List<String>
    The subjects allowed to be present in the channel token claim specified by config.channel_token_subject_claim.
    channelTokenUpstreamHeader String
    This plugin removes the config.channel_token_request_header from the request after reading its value.
    channelTokenUpstreamLeeway Number
    If you want to add or perhaps subtract (using negative value) expiry time of the original channel token, you can specify a value that is added to the original channel token's exp claim. Default: 0
    enableAccessTokenIntrospection Boolean
    If you don't want to support opaque access tokens, change this configuration parameter to false to disable introspection. Default: true
    enableChannelTokenIntrospection Boolean
    If you don't want to support opaque channel tokens, disable introspection by changing this configuration parameter to false. Default: true
    enableHsSignatures Boolean
    Tokens signed with HMAC algorithms such as HS256, HS384, or HS512 are not accepted by default. If you need to accept such tokens for verification, enable this setting. Default: false
    enableInstrumentation Boolean
    Writes log entries with some added information using ngx.CRIT (CRITICAL) level. Default: false
    originalAccessTokenUpstreamHeader String
    The HTTP header name used to store the original access token.
    originalChannelTokenUpstreamHeader String
    The HTTP header name used to store the original channel token.
    realm String
    When authentication or authorization fails, or there is an unexpected error, the plugin sends an WWW-Authenticate header with the realm attribute value.
    removeAccessTokenClaims List<String>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    removeChannelTokenClaims List<String>
    remove claims. It should be an array, and each element is a claim key string. Default: []
    setAccessTokenClaims Map<String>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setChannelTokenClaims Map<String>
    Set customized claims. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    setClaims Map<String>
    Set customized claims to both tokens. If a claim is already present, it will be overwritten. Value can be a regular or JSON string; if JSON, decoded data is used as the claim's value.
    trustAccessTokenIntrospection Boolean
    Use this parameter to enable and disable further checks on a payload before the new token is signed. If you set this to true, the expiry or scopes are not checked on a payload. Default: true
    trustChannelTokenIntrospection Boolean
    Providing an opaque channel token for plugin introspection, and verifying expiry and scopes on introspection results may make further payload checks unnecessary before the plugin signs a new token. This also applies when using a JWT token with introspection JSON as per config.channeltokenintrospectionjwtclaim. Use this parameter to manage additional payload checks before signing a new token. With true (default), payload's expiry or scopes aren't checked. Default: true
    verifyAccessTokenAudience Boolean
    Quickly turn off and on the access token required audiences verification, specified with config.access_token_audiences_required. Default: true
    verifyAccessTokenExpiry Boolean
    Quickly turn access token expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionAudience Boolean
    Quickly turn off and on the access token introspection required audiences verification, specified with config.access_token_introspection_audiences_required. Default: true
    verifyAccessTokenIntrospectionExpiry Boolean
    Quickly turn access token introspection expiry verification off and on as needed. Default: true
    verifyAccessTokenIntrospectionIssuer Boolean
    Quickly turn off and on the access token introspection allowed issuers verification, specified with config.access_token_introspection_issuers_allowed. Default: true
    verifyAccessTokenIntrospectionNotbefore Boolean
    Quickly turn off and on the access token introspection notbefore verification. Default: false
    verifyAccessTokenIntrospectionScopes Boolean
    Quickly turn off and on the access token introspection scopes verification, specified with config.access_token_introspection_scopes_required. Default: true
    verifyAccessTokenIntrospectionSubject Boolean
    Quickly turn off and on the access token introspection required subjects verification, specified with config.access_token_introspection_subjects_required. Default: true
    verifyAccessTokenIssuer Boolean
    Quickly turn off and on the access token allowed issuers verification, specified with config.access_token_issuers_allowed. Default: true
    verifyAccessTokenNotbefore Boolean
    Quickly turn off and on the access token notbefore verification. Default: false
    verifyAccessTokenScopes Boolean
    Quickly turn off and on the access token required scopes verification, specified with config.access_token_scopes_required. Default: true
    verifyAccessTokenSignature Boolean
    Quickly turn access token signature verification off and on as needed. Default: true
    verifyAccessTokenSubject Boolean
    Quickly turn off and on the access token required subjects verification, specified with config.access_token_subjects_required. Default: true
    verifyChannelTokenAudience Boolean
    Quickly turn off and on the channel token required audiences verification, specified with config.channel_token_audiences_required. Default: true
    verifyChannelTokenExpiry Boolean
    Default: true
    verifyChannelTokenIntrospectionAudience Boolean
    Quickly turn off and on the channel token introspection required audiences verification, specified with config.channel_token_introspection_audiences_required. Default: true
    verifyChannelTokenIntrospectionExpiry Boolean
    Quickly turn on/off the channel token introspection expiry verification. Default: true
    verifyChannelTokenIntrospectionIssuer Boolean
    Quickly turn off and on the channel token introspection allowed issuers verification, specified with config.channel_token_introspection_issuers_allowed. Default: true
    verifyChannelTokenIntrospectionNotbefore Boolean
    Quickly turn off and on the channel token introspection notbefore verification. Default: false
    verifyChannelTokenIntrospectionScopes Boolean
    Quickly turn on/off the channel token introspection scopes verification specified with config.channel_token_introspection_scopes_required. Default: true
    verifyChannelTokenIntrospectionSubject Boolean
    Quickly turn off and on the channel token introspection required subjects verification, specified with config.channel_token_introspection_subjects_required. Default: true
    verifyChannelTokenIssuer Boolean
    Quickly turn off and on the channel token allowed issuers verification, specified with config.channel_token_issuers_allowed. Default: true
    verifyChannelTokenNotbefore Boolean
    Quickly turn off and on the channel token notbefore verification. Default: false
    verifyChannelTokenScopes Boolean
    Quickly turn on/off the channel token required scopes verification specified with config.channel_token_scopes_required. Default: true
    verifyChannelTokenSignature Boolean
    Quickly turn on/off the channel token signature verification. Default: true
    verifyChannelTokenSubject Boolean
    Quickly turn off and on the channel token required subjects verification, specified with config.channel_token_subjects_required. Default: true

    GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificate, GatewayPluginJwtSignerConfigAccessTokenJwksUriClientCertificateArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificate, GatewayPluginJwtSignerConfigAccessTokenKeysetClientCertificateArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificate, GatewayPluginJwtSignerConfigChannelTokenJwksUriClientCertificateArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificate, GatewayPluginJwtSignerConfigChannelTokenKeysetClientCertificateArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    GatewayPluginJwtSignerOrdering, GatewayPluginJwtSignerOrderingArgs

    GatewayPluginJwtSignerOrderingAfter, GatewayPluginJwtSignerOrderingAfterArgs

    Accesses List<string>
    Accesses []string
    accesses List<String>
    accesses string[]
    accesses Sequence[str]
    accesses List<String>

    GatewayPluginJwtSignerOrderingBefore, GatewayPluginJwtSignerOrderingBeforeArgs

    Accesses List<string>
    Accesses []string
    accesses List<String>
    accesses string[]
    accesses Sequence[str]
    accesses List<String>

    GatewayPluginJwtSignerPartial, GatewayPluginJwtSignerPartialArgs

    Id string
    A string representing a UUID (universally unique identifier).
    Name string
    A unique string representing a UTF-8 encoded name.
    Path string
    Id string
    A string representing a UUID (universally unique identifier).
    Name string
    A unique string representing a UTF-8 encoded name.
    Path string
    id String
    A string representing a UUID (universally unique identifier).
    name String
    A unique string representing a UTF-8 encoded name.
    path String
    id string
    A string representing a UUID (universally unique identifier).
    name string
    A unique string representing a UTF-8 encoded name.
    path string
    id str
    A string representing a UUID (universally unique identifier).
    name str
    A unique string representing a UTF-8 encoded name.
    path str
    id String
    A string representing a UUID (universally unique identifier).
    name String
    A unique string representing a UTF-8 encoded name.
    path String

    GatewayPluginJwtSignerRoute, GatewayPluginJwtSignerRouteArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    GatewayPluginJwtSignerService, GatewayPluginJwtSignerServiceArgs

    Id string
    Id string
    id String
    id string
    id str
    id String

    Import

    In Terraform v1.5.0 and later, the import block can be used with the id attribute, for example:

    terraform

    import {

    to = konnect_gateway_plugin_jwt_signer.my_konnect_gateway_plugin_jwt_signer

    id = jsonencode({

    control_plane_id = "9524ec7d-36d9-465d-a8c5-83a3c9390458"
    
    id = "3473c251-5b6c-4f45-b1ff-7ede735a366d"
    

    })

    }

    The pulumi import command can be used, for example:

    $ pulumi import konnect:index/gatewayPluginJwtSigner:GatewayPluginJwtSigner my_konnect_gateway_plugin_jwt_signer '{"control_plane_id": "9524ec7d-36d9-465d-a8c5-83a3c9390458", "id": "3473c251-5b6c-4f45-b1ff-7ede735a366d"}'
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    konnect kong/terraform-provider-konnect
    License
    Notes
    This Pulumi package is based on the konnect Terraform Provider.
    konnect logo
    konnect 3.4.1 published on Wednesday, Oct 29, 2025 by kong
      Meet Neo: Your AI Platform Teammate