You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi @epourail ! There is an option to strip_claims so that the headers are not sent to the upstream. By default it is set to false. Set to true and this should do what you want. Please confirm.
I don't want to strip the claim once extracted.
I want to be sure the HTTP header comes from extracted claim (via the jwt2header plugin) and it is not a custom header set by the client.
This improvement should fix the following issue:
Context:
In case my upstream performs operations on a custom HTTP header "x-kong-jwt-claim-dummy" (in theory, extracted from the bearer)
Scenario
Result
The upstream will receive the "x-kong-jwt-claim-dummy" header and trigger the operations
Expected Result
The upstream should not receive the header
Solution
To improve the security, you should cleanup the HTTP headers of the input request matching the pattern "x-kong-jwt-claim"
The text was updated successfully, but these errors were encountered: