Auth token is not passing through header

I am trying to use the Authorization token in my swagger JSON documentation. My APIs are already using Bearer tokens for their authentication. When I am using the Auth token from the portal then it is not working.

  1. Our Nodejs REST API is using the JWT token for authentication. When we are trying to send the request from the Tyk where adding the bearer token in the header then we are not getting the request header in nodejs request.

  2. Header Bearer token is used for Application API authentication which we are getting after login API.

  3. Header X-API-KEY is used for Tyk authentication.

Hi @mamtabhardwaj12.

Maybe you can try to change the Authorization header name for one of the Auth types in tyk. I faced a similar issue and doing this worked.

Regards,
Prashanth

I Prashanth,

Thank you for your quick reply.
I already changes the authorization header name with x-api-key.
Please refer to the attached screenshot above.

Regards,
Mamta

Hi @mamtabhardwaj12.

I believe someone else from the community can pitch in regarding this.

Regards,
Prashanth

@mamtabhardwaj12 Could you share what version of tyk you are using, as well the api definition (with sensitive information stripped)?

Hi,
I am using Tyk v3.1.2. My tyk setup is on openshift cluster.
API definition:-
{
“openapi”: “3.0.1”,
“info”: {
“title”: “defaultTitle”,
“description”: “defaultDescription”,
“version”: “0.1”
},
“servers”: [
{
“url”: “http://tyk-gateway-tyk-cateina.api.164.52.220.55.nip.io
}
],
“paths”: {
“/swaginspect/api/users/authenticate”: {
“post”: {
“description”: “Auto generated using Swagger Inspector”,
“requestBody”: {
“content”: {
“application/json”: {
“schema”: {
“$ref”: “#/components/schemas/users_authenticate_body”
},
“examples”: {
“0”: {
“value”: “{\n "username": "abc",\n "password": "123"\n}”
}
}
}
}
},
“responses”: {
“200”: {
“description”: “Auto generated using Swagger Inspector”,
“content”: {
“application/json; charset=utf-8”: {
“schema”: {
“type”: “string”
},
“examples”: {}
}
}
}
},
“security”: [
{
“ApiKeyAuth”: []
}
]
}
},
“/swaginspect/api/users/getUserDetails”: {
“post”: {
“description”: “Auto generated using Swagger Inspector”,
“requestBody”: {
“content”: {
“application/json”: {
“schema”: {
“$ref”: “#/components/schemas/users”
},
“examples”: {
“0”: {
“value”: “{\n "username": "kf123",\n "sessionCheck": true\n}”
}
}
}
}
},
“responses”: {
“200”: {
“description”: “Auto generated using Swagger Inspector”,
“content”: {
“application/json; charset=utf-8”: {
“schema”: {
“type”: “string”
},
“examples”: {}
}
}
}
},
“security”: [
{
“ApiKeyAuth”: []
}
]
}
},
“/swaginspect/api/users/getAllPrivateUsers”: {
“get”: {
“tags”: [
“Users”
],
“summary”: “This API use to get all private users”,
“description”: “This API use to get all private users. This can only be done by the logged in user. You have to login to get token”,
“responses”: {
“200”: {
“description”: “Success. You will get all private users detail”,
“content”: {}
},
“400”: {
“description”: “Failed to get Data”,
“content”: {}
},
“500”: {
“description”: “Internal server error.”,
“content”: {}
}
},
“security”: [
{
“BearerAuth”: []
},
{
“ApiKeyAuth”: []
}
]
}
}
},
“components”: {
“schemas”: {
“users_authenticate_body”: {
“type”: “object”,
“properties”: {
“password”: {
“type”: “string”
},
“username”: {
“type”: “string”
}
}
},
“users”: {
“type”: “object”,
“properties”: {
“username”: {
“type”: “string”
},
“sessionCheck”: {
“type”: “boolean”
}
}
}
},
“securitySchemes”: {
“BearerAuth”: {
“type”: “http”,
“scheme”: “bearer”,
“bearerFormat”: “JWT”
},
“ApiKeyAuth”: {
“type”: “apiKey”,
“in”: “header”,
“name”: “X-API-KEY”
}
}
}
}

Hi @mamtabhardwaj12,

I was hoping to get the actual Tyk API definition to check if “strip_auth_data” was enabled. Regardless, could you check if the value is set to false.

Also, could you try making the same call via Postman and the Debugger on the dashboard and let us know the result.

Hi Olu,

PFA of the postman response and tyk portal response.

Raw definition:-
{
“created_at”: “2021-09-06T06:16:42Z”,
“api_model”: {},
“api_definition”: {
“api_id”: “c2934daca2e54fd1494c066ea8599cd6”,
“jwt_issued_at_validation_skew”: 0,
“upstream_certificates”: {},
“use_keyless”: false,
“enable_coprocess_auth”: false,
“base_identity_provided_by”: “”,
“custom_middleware”: {
“pre”: [],
“post”: [],
“post_key_auth”: [],
“auth_check”: {
“name”: “”,
“path”: “”,
“require_session”: false,
“raw_body_only”: false
},
“response”: [],
“driver”: “”,
“id_extractor”: {
“extract_from”: “”,
“extract_with”: “”,
“extractor_config”: {}
}
},
“disable_quota”: false,
“custom_middleware_bundle”: “”,
“cache_options”: {
“cache_timeout”: 60,
“enable_cache”: true,
“cache_all_safe_requests”: false,
“cache_response_codes”: [],
“enable_upstream_cache_control”: false,
“cache_control_ttl_header”: “”,
“cache_by_headers”: []
},
“enable_ip_blacklisting”: false,
“tag_headers”: [],
“jwt_scope_to_policy_mapping”: {},
“pinned_public_keys”: {},
“expire_analytics_after”: 0,
“domain”: “tyk-gateway-tyk-cateina.api.164.52.220.55.nip.io”,
“openid_options”: {
“providers”: [],
“segregate_by_client”: false
},
“jwt_policy_field_name”: “”,
“enable_proxy_protocol”: false,
“jwt_default_policies”: [],
“active”: true,
“jwt_expires_at_validation_skew”: 0,
“config_data”: {},
“notifications”: {
“shared_secret”: “”,
“oauth_on_keychange_url”: “”
},
“jwt_client_base_field”: “”,
“auth”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“check_host_against_uptime_tests”: false,
“auth_provider”: {
“name”: “”,
“storage_engine”: “”,
“meta”: {}
},
“blacklisted_ips”: [],
“graphql”: {
“enabled”: false,
“execution_mode”: “proxyOnly”,
“schema”: “”,
“type_field_configurations”: [],
“playground”: {
“enabled”: false,
“path”: “”
}
},
“hmac_allowed_clock_skew”: -1,
“dont_set_quota_on_create”: false,
“uptime_tests”: {
“check_list”: [],
“config”: {
“expire_utime_after”: 0,
“service_discovery”: {
“use_discovery_service”: false,
“query_endpoint”: “”,
“use_nested_query”: false,
“parent_data_path”: “”,
“data_path”: “”,
“cache_timeout”: 60
},
“recheck_wait”: 0
}
},
“enable_jwt”: false,
“do_not_track”: false,
“name”: “Comgo_Authtoken”,
“slug”: “comgo_authtoken”,
“oauth_meta”: {
“allowed_access_types”: [],
“allowed_authorize_types”: [],
“auth_login_redirect”: “”
},
“CORS”: {
“enable”: true,
“max_age”: 24,
“allow_credentials”: false,
“exposed_headers”: [
“X-API-KEY”,
“Authorization”
],
“allowed_headers”: [
“Origin”,
“Accept”,
“Content-Type”,
“X-Requested-With”,
“Authorization”,
“X-API-KEY”
],
“options_passthrough”: false,
“debug”: false,
“allowed_origins”: [
“*”,
http://tyk-dashboard-tyk-cateina.api.164.52.220.55.nip.io/”,
https://test.comgo.io/
],
“allowed_methods”: [
“GET”,
“POST”,
“HEAD”
]
},
“event_handlers”: {
“events”: {}
},
“proxy”: {
“target_url”: “https://test.comgo.io/”,
“service_discovery”: {
“endpoint_returns_list”: false,
“cache_timeout”: 0,
“parent_data_path”: “”,
“query_endpoint”: “”,
“use_discovery_service”: false,
“_sd_show_port_path”: false,
“target_path”: “”,
“use_target_list”: false,
“use_nested_query”: false,
“data_path”: “”,
“port_data_path”: “”
},
“check_host_against_uptime_tests”: false,
“transport”: {
“ssl_insecure_skip_verify”: false,
“ssl_min_version”: 0,
“proxy_url”: “”,
“ssl_ciphers”: []
},
“target_list”: [],
“preserve_host_header”: false,
“strip_listen_path”: true,
“enable_load_balancing”: false,
“listen_path”: “/comgo_authtoken/”,
“disable_strip_slash”: false
},
“client_certificates”: [],
“use_basic_auth”: false,
“version_data”: {
“not_versioned”: true,
“default_version”: “”,
“versions”: {
“Default”: {
“name”: “Default”,
“expires”: “”,
“paths”: {
“ignored”: [],
“white_list”: [],
“black_list”: []
},
“use_extended_paths”: true,
“extended_paths”: {
“ignored”: [],
“white_list”: [],
“black_list”: [],
“transform”: [],
“transform_response”: [],
“transform_jq”: [],
“transform_jq_response”: [],
“transform_headers”: [],
“transform_response_headers”: [],
“hard_timeouts”: [],
“circuit_breakers”: [],
“url_rewrites”: [],
“virtual”: [],
“size_limits”: [],
“method_transforms”: [],
“track_endpoints”: [],
“do_not_track_endpoints”: [],
“validate_json”: [],
“internal”: []
},
“global_headers”: {},
“global_headers_remove”: [],
“global_response_headers”: {},
“global_response_headers_remove”: [],
“ignore_endpoint_case”: false,
“global_size_limit”: 0,
“override_target”: “”
}
}
},
“jwt_scope_claim_name”: “”,
“use_standard_auth”: true,
“session_lifetime”: 0,
“hmac_allowed_algorithms”: [],
“disable_rate_limit”: false,
“definition”: {
“location”: “header”,
“key”: “x-api-version”,
“strip_path”: false
},
“use_oauth2”: false,
“jwt_source”: “”,
“jwt_signing_method”: “”,
“jwt_not_before_validation_skew”: 0,
“use_go_plugin_auth”: false,
“jwt_identity_base_field”: “”,
“allowed_ips”: [],
“request_signing”: {
“is_enabled”: false,
“secret”: “”,
“key_id”: “”,
“algorithm”: “”,
“header_list”: [],
“certificate_id”: “”,
“signature_header”: “”
},
“org_id”: “6043744f924fc30001082ae4”,
“enable_ip_whitelisting”: false,
“global_rate_limit”: {
“rate”: 0,
“per”: 0
},
“protocol”: “”,
“enable_context_vars”: false,
“tags”: [],
“basic_auth”: {
“disable_caching”: false,
“cache_ttl”: 0,
“extract_from_body”: false,
“body_user_regexp”: “”,
“body_password_regexp”: “”
},
“listen_port”: 0,
“session_provider”: {
“name”: “”,
“storage_engine”: “”,
“meta”: {}
},
“auth_configs”: {
“authToken”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “X-API-KEY”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“basic”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“coprocess”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“hmac”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“jwt”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“oauth”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“oidc”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
}
},
“strip_auth_data”: true,
“id”: “6135b24a1b741a000150f910”,
“certificates”: [],
“enable_signature_checking”: false,
“use_openid”: false,
“internal”: false,
“jwt_skip_kid”: false,
“enable_batch_request_support”: false,
“enable_detailed_recording”: false,
“response_processors”: [],
“use_mutual_tls_auth”: false
},
“hook_references”: [],
“is_site”: false,
“sort_by”: 0,
“user_group_owners”: [],
“user_owners”: []
}

Thanks for sharing the postman and portal results.

From your api_def, I can see that the value of “strip_auth_data” is set to true.

image

This would strip out any authentication header set, including the default Authorization header.

This can be a problem if you are proxying to your authenticate endpoint. If setting the value to false does not fix the issue then could you explain the flow of the request to fully understand. For example what endpoint is calling the …/api/users/authenticate endpoint

Hi Olu,
Thank you for replying.
If I set the “strip_auth_data” false then I am getting the response from Postman and while testing through from Tyk portal then I am getting “session expired” in response. PFA for details.
If I checked the logs then the only difference while doing it from postman is we are getting the cookies which is not available during the tyk portal request.
I am checking the logs on my backend Nodejs application.

Hi Olu,

The flow of the API call’s:-

  1. First we are using the tyk authentication by calling the below API to get the “user token” for calling the next API in response.

POST http://tyk-gateway-tyk-cateina.api.164.52.220.55.nip.io/comgo_authtoken/api/users/authenticate

  1. In the second call we are using the above “user token” as an authorization header which we received as a response in the first API call. We are getting the response as “session expired”.
    Maybe the reason will be user token is not passing through the header to the backend for authentication.

GET http://tyk-gateway-tyk-cateina.api.164.52.220.55.nip.io/comgo_authtoken/api/users/getAllPrivateUsers

Sounds like the key may be expired. Could you check if the keys are the same.

If not then kindly confirm that their TTL is not expired Physical Key Expiry and Deletion (tyk.io)

Hi Olu,

The keys are same and not expired.

Hi Olu,
I went through the given document link above and set the
“session_lifetime”: 86400 in the raw definition as below but still getting the same response.


{
“created_at”: “2021-09-06T06:16:42Z”,
“api_model”: {},
“api_definition”: {
“api_id”: “c2934daca2e54fd1494c066ea8599cd6”,
“jwt_issued_at_validation_skew”: 0,
“upstream_certificates”: {},
“use_keyless”: false,
“enable_coprocess_auth”: false,
“base_identity_provided_by”: “”,
“custom_middleware”: {
“pre”: [],
“post”: [],
“post_key_auth”: [],
“auth_check”: {
“name”: “”,
“path”: “”,
“require_session”: false,
“raw_body_only”: false
},
“response”: [],
“driver”: “”,
“id_extractor”: {
“extract_from”: “”,
“extract_with”: “”,
“extractor_config”: {}
}
},
“disable_quota”: false,
“custom_middleware_bundle”: “”,
“cache_options”: {
“cache_timeout”: 60,
“enable_cache”: true,
“cache_all_safe_requests”: false,
“cache_response_codes”: [],
“enable_upstream_cache_control”: false,
“cache_control_ttl_header”: “”,
“cache_by_headers”: []
},
“enable_ip_blacklisting”: false,
“tag_headers”: [],
“jwt_scope_to_policy_mapping”: {},
“pinned_public_keys”: {},
“expire_analytics_after”: 0,
“domain”: “tyk-gateway-tyk-cateina.api.164.52.220.55.nip.io”,
“openid_options”: {
“providers”: [],
“segregate_by_client”: false
},
“jwt_policy_field_name”: “”,
“enable_proxy_protocol”: false,
“jwt_default_policies”: [],
“active”: true,
“jwt_expires_at_validation_skew”: 0,
“config_data”: {},
“notifications”: {
“shared_secret”: “”,
“oauth_on_keychange_url”: “”
},
“jwt_client_base_field”: “”,
“auth”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“check_host_against_uptime_tests”: false,
“auth_provider”: {
“name”: “”,
“storage_engine”: “”,
“meta”: {}
},
“blacklisted_ips”: [],
“graphql”: {
“enabled”: false,
“execution_mode”: “proxyOnly”,
“schema”: “”,
“type_field_configurations”: [],
“playground”: {
“enabled”: false,
“path”: “”
}
},
“hmac_allowed_clock_skew”: -1,
“dont_set_quota_on_create”: false,
“uptime_tests”: {
“check_list”: [],
“config”: {
“expire_utime_after”: 0,
“service_discovery”: {
“use_discovery_service”: false,
“query_endpoint”: “”,
“use_nested_query”: false,
“parent_data_path”: “”,
“data_path”: “”,
“cache_timeout”: 60
},
“recheck_wait”: 0
}
},
“enable_jwt”: false,
“do_not_track”: false,
“name”: “Comgo_Authtoken”,
“slug”: “comgo_authtoken”,
“oauth_meta”: {
“allowed_access_types”: [],
“allowed_authorize_types”: [],
“auth_login_redirect”: “”
},
“CORS”: {
“enable”: true,
“max_age”: 24,
“allow_credentials”: false,
“exposed_headers”: [
“X-API-KEY”,
“Authorization”
],
“allowed_headers”: [
“Origin”,
“Accept”,
“Content-Type”,
“X-Requested-With”,
“Authorization”,
“X-API-KEY”
],
“options_passthrough”: false,
“debug”: false,
“allowed_origins”: [
“*”,
http://tyk-dashboard-tyk-cateina.api.164.52.220.55.nip.io/”,
https://test.comgo.io/
],
“allowed_methods”: [
“GET”,
“POST”,
“HEAD”
]
},
“event_handlers”: {
“events”: {}
},
“proxy”: {
“target_url”: “https://test.comgo.io/”,
“service_discovery”: {
“endpoint_returns_list”: false,
“cache_timeout”: 0,
“parent_data_path”: “”,
“query_endpoint”: “”,
“use_discovery_service”: false,
“_sd_show_port_path”: false,
“target_path”: “”,
“use_target_list”: false,
“use_nested_query”: false,
“data_path”: “”,
“port_data_path”: “”
},
“check_host_against_uptime_tests”: false,
“transport”: {
“ssl_insecure_skip_verify”: false,
“ssl_min_version”: 0,
“proxy_url”: “”,
“ssl_ciphers”: []
},
“target_list”: [],
“preserve_host_header”: false,
“strip_listen_path”: true,
“enable_load_balancing”: false,
“listen_path”: “/comgo_authtoken/”,
“disable_strip_slash”: false
},
“client_certificates”: [],
“use_basic_auth”: false,
“version_data”: {
“not_versioned”: true,
“default_version”: “”,
“versions”: {
“Default”: {
“name”: “Default”,
“expires”: “”,
“paths”: {
“ignored”: [],
“white_list”: [],
“black_list”: []
},
“use_extended_paths”: true,
“extended_paths”: {
“ignored”: [],
“white_list”: [],
“black_list”: [],
“transform”: [],
“transform_response”: [],
“transform_jq”: [],
“transform_jq_response”: [],
“transform_headers”: [],
“transform_response_headers”: [],
“hard_timeouts”: [],
“circuit_breakers”: [],
“url_rewrites”: [],
“virtual”: [],
“size_limits”: [],
“method_transforms”: [],
“track_endpoints”: [],
“do_not_track_endpoints”: [],
“validate_json”: [],
“internal”: []
},
“global_headers”: {},
“global_headers_remove”: [],
“global_response_headers”: {},
“global_response_headers_remove”: [],
“ignore_endpoint_case”: false,
“global_size_limit”: 0,
“override_target”: “”
}
}
},
“jwt_scope_claim_name”: “”,
“use_standard_auth”: true,
“session_lifetime”: 86400,
“hmac_allowed_algorithms”: [],
“disable_rate_limit”: false,
“definition”: {
“location”: “header”,
“key”: “x-api-version”,
“strip_path”: false
},
“use_oauth2”: false,
“jwt_source”: “”,
“jwt_signing_method”: “”,
“jwt_not_before_validation_skew”: 0,
“use_go_plugin_auth”: false,
“jwt_identity_base_field”: “”,
“allowed_ips”: [],
“request_signing”: {
“is_enabled”: false,
“secret”: “”,
“key_id”: “”,
“algorithm”: “”,
“header_list”: [],
“certificate_id”: “”,
“signature_header”: “”
},
“org_id”: “6043744f924fc30001082ae4”,
“enable_ip_whitelisting”: false,
“global_rate_limit”: {
“rate”: 0,
“per”: 0
},
“protocol”: “”,
“enable_context_vars”: false,
“tags”: [],
“basic_auth”: {
“disable_caching”: false,
“cache_ttl”: 0,
“extract_from_body”: false,
“body_user_regexp”: “”,
“body_password_regexp”: “”
},
“listen_port”: 0,
“session_provider”: {
“name”: “”,
“storage_engine”: “”,
“meta”: {}
},
“auth_configs”: {
“authToken”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: true,
“cookie_name”: “”,
“auth_header_name”: “X-API-KEY”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“basic”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“coprocess”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“hmac”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“jwt”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“oauth”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
},
“oidc”: {
“use_param”: false,
“param_name”: “”,
“use_cookie”: false,
“cookie_name”: “”,
“auth_header_name”: “Authorization”,
“use_certificate”: false,
“validate_signature”: false,
“signature”: {
“algorithm”: “”,
“header”: “”,
“secret”: “”,
“allowed_clock_skew”: 0,
“error_code”: 0,
“error_message”: “”
}
}
},
“strip_auth_data”: false,
“id”: “6135b24a1b741a000150f910”,
“certificates”: [],
“enable_signature_checking”: false,
“use_openid”: false,
“internal”: false,
“jwt_skip_kid”: false,
“enable_batch_request_support”: false,
“enable_detailed_recording”: false,
“response_processors”: [],
“use_mutual_tls_auth”: false
},
“hook_references”: [],
“is_site”: false,
“sort_by”: 0,
“user_group_owners”: [],
“user_owners”: []
}

I will try and reproduce the issue on my end based on the API definition. In the meantime, could you share the Gateway logs in debug mode during the time of the incident or a fresh session.

Hi Olu,
Have you tried to reproduce the same issue at your end?
I am unable to see any logs in gateway pods.
Is there any option where I can configure the gateway log?

Regards,
Mamta

I did not get the chance to try it on the portal yet. However, one of our internal should reach out to you to assist further.

About configuring the gateway, you can use the tyk.config file or environment variables (Gateway environment variables require a TYK_GW_ prefix)

Setting the log level = true will show more information