Skip to main content


Authentication enable the typegate to identify the user making the request and share some contextual data (called later "context" or "claims"). This data can then be used by policies or injected into various fields. Authenticated requests must use the Authorization header to provide a token in one of the following format.

Basic authentication

Basic authentication is the simplest way to authenticate requests. It is done by sending a base64 encoded string of your username and password in the authorization header. Recall that base64 encoding is not encryption and can be easily reversed, thus the traffic must be encrypted with SSL/TLS when using basic authentication as your password will otherwise be visible.

HeaderAuthorization: Basic base64(username:password)
Context{ username }

JWT authentication

A more secure way to authenticate requests is to use JSON Web Tokens. The context of a user is signed with a secret key and the typegate will verify the signature to ensure the context has not been tampered with. The JWT is then sent in the authorization header.

The JWT is usually generated by an external identity provider (IdP) such as Keycloak or Auth0 and limited in time. The typegate will check that the exp (expiration time) and nbf (not before) are valid if they exist in the context. The logic of refreshing expired tokens is left to the user or the IdP client library being used.

The typegate supports the most frequently used algorithms for signing the JWT and can be imported as using "jwk", "raw", "pkcs8" or "spki" formats (see SubtleCrypto documentation). For instance, an asymmetric key pair can be generated with the following command:

const keys = await crypto.subtle.generateKey(
{ name: "ECDSA", namedCurve: "P-384" },
["sign", "verify"],
const publicKey = await crypto.subtle.exportKey("jwk", keys.publicKey);
// save keys.privateKey for later use
// in typegraph: Auth.jwt("keycloak", "jwk", {"name": "ECDSA", "namedCurve": "P-384"})

Even though, asymmetric encryption is recommended, HMAC-SHA256 is so commonly used that an alias is provided for it.

HeaderAuthorization: Bearer token
Context{ your_own_content }

Note that for the sake of the demo, the token has no expiration time. Tokens should always be shorted lived and refreshed frequently to reduce the risk of unexpected access.

OAuth2 authorization

OAuth2 allows a user to grant limited access to their resources on one site, to another site, without having to expose their credentials. It is commonly used when the typegate needed to access restricted information in third-parties such as Google or GitHub.

Most of the time, the OAuth2 is managed by your identity provider and relies on the JWT authentication as explained above. However the typegate provides a simple way to handle the OAuth2 flow without IdP or when the system should be lightweight.

Secrets[authentication]_CLIENT_ID=client_id, [authentication]_CLIENT_SECRET=client_secret
HeaderAuthorization: Bearer token
Context{ content_from_your_idp }

Take flow

  1. Redirect the user to https://[typegate][typegraph]/auth/[authentication]?redirect_uri= and the OAuth2 starts for the user

  2. When the user has completed the flow, the typegate will redirect the user to and you can "take" the token from the typegate as follows. This can be only done once and is limited in time:

const take = await fetch(
credentials: "include",
const { token } = await take.json();
  1. The token can then be used as JWT in the Authorization header of your requests, and the response of the typegate will contain a header Next-Authorization. When this header is present, the value should be used in follow-up calls (value will be empty if the authentication has expired).

OpenID Connect

OpenID Connect is an authentication layer on top of OAuth2. It is used to verify the identity of the user and retrieve basic information about them. You can add openid to the OAuth2 scope and you will receive an id_token in the response. The id_token is a JWT that contains the user's information and is signed by the IdP.

Embedded providers

Frequent OAuth2 providers are embedded and can be directly used in the typegraph.

from typegraph.graph.auth import oauth2
oauth2.github("openid profile email")

The whole list is available here.