Authorization
header, and uses set, stripped comma-delimited fields to identify the user, from the draft proposal:
hmac.allowedAlgorithms
(Tyk Classic: hmac_allowed_algorithms
) field in your API definition, like this: "hmac_allowed_algorithms": ["hmac-sha256", "hmac-sha512"]
.
The date format for an encoded string is:
Authorization
header, and retrieved from Redis. If a key exists then Tyk will generate its own signature based on the request’s “date” header, if this generated signature matches the signature in the Authorization
header the request is passed.
headers
HMAC signature field. This includes the request method and path using the(request-target)
value. For body signature verification, HTTP Digest headers should be included in the request and in the header field value.
x-aux-date
header, it will use this to replace the Date header.
hmac.allowedClockSkew
(Tyk Classic: hmac_allowed_clock_skew
) value. This value will default to 0, which deactivates clock skew checks.
hmac
object within the server.authentication
section and enabling authentication.
You must indicate where Tyk should look for the request signature (header
, query
or cookie
) and which algorithm
will be used to encrypt the secret to create the signature. You can also optionally configure a limit for the allowedClockSkew
between the timestamp in the signature and the current time as measured by Tyk.
authentication.stripAuthorizationData
field (Tyk Classic: strip_auth_data
).
enable_signature_checking
option.
hmac_enabled
to true
. Tyk will return the HMAC secret in the response confirming creation of the key.
When calling the API, the client would never use the key itself as a token, instead they must sign requests using the provided secret.