JWTAuth validates Bearer JSON Web Tokens using JWKS, an OIDC issuer, or a static public key, and produces a principal on success.Documentation Index
Fetch the complete documentation index at: https://engineering.unkey.com/llms.txt
Use this file to discover all available pages before exploring further.
JWTAuth is defined in the policy schema but is not executed by the sentinel engine yet.
Fields
URL of the JWKS endpoint for token verification.
OIDC issuer URL. Sentinel discovers the JWKS URI from the issuer’s
.well-known/openid-configuration.PEM-encoded public key for token verification. Use this for static key pairs.
Required
iss claim value.Allowed
aud claim values.Allowed signing algorithms.
Claim used as the principal subject. Defaults to
sub.When true, requests without a token are allowed through without setting a principal.
Tolerance for time-based claim validation (
exp, nbf, iat), in milliseconds.How long to cache the JWKS response, in milliseconds.
Examples
- OIDC issuer
- JWKS URI
- Optional auth

