Authorization directives can be used in your schema to define granular authorization rules on the field definition level. Documentation can be found at @authenticated and @requiresScopes.
Current Configuration
In the current router version, the configuration and behavior of authentication have been redesigned. Instead of specifying a configuration per JWKS endpoint, you can now list multiple endpoints where all header rules apply to. Each JWKS endpoint can optionally specify a whitelist of supported JWT algorithms.Configuration
Old Router configuration (< 0.168.1)
Enforce authentication
By default, requests without authentication information are allowed. Only requests with invalid authentication information (e.g. an incorrectly signed token) produce a403 Forbidden
response. To disable anonymous requests, use the Authorization configuration:
401 Unauthorized
Authentication information is also available to custom modules. See Access Authenticated Information.