@@ -54,12 +54,9 @@ are valid! If a handler encounters invalid credentials, then other handlers will
54
54
55
55
## ` noop `
56
56
57
- The ` noop ` handler tells Ory Oathkeeper to bypass authentication, authorization, and mutation. This implies that no authorization
58
- will be executed and no credentials will be issued. It's basically a pass-all authenticator that allows any request to be
59
- forwarded to the upstream URL.
57
+ The ` noop ` handler always authenticate the user, no questions asked. It applies authorization, and mutation.
60
58
61
- > Using this handler is basically an allow-all configuration. It makes sense when the upstream handles access control itself or
62
- > doesn't need any type of access control.
59
+ > Using this handler is basically an allow-all configuration.
63
60
64
61
### ` noop ` configuration
65
62
@@ -215,6 +212,56 @@ The request isn't authorized because credentials have been provided but only the
215
212
authenticator is enabled for this URL.
216
213
` ` `
217
214
215
+ # # `delegate`
216
+
217
+ The `delegate` handler tells Ory Oathkeeper to bypass authentication, authorization, and mutation. This implies that no
218
+ authorization will be executed and no credentials will be issued. It's basically a pass-all authenticator that allows
219
+ any request to be forwarded to the upstream URL.
220
+
221
+ > Using this handler is basically an allow-all configuration. It makes sense when the upstream handles access control itself or
222
+ > doesn't need any type of access control.
223
+
224
+ # ## `delegate` configuration
225
+
226
+ This handler isn't configurable.
227
+
228
+ To enable this handler, set :
229
+
230
+ ` ` ` yaml
231
+ # Global configuration file oathkeeper.yml
232
+ authenticators:
233
+ delegate:
234
+ # Set enabled to true if the authenticator should be enabled and false to disable the authenticator. Defaults to false.
235
+ enabled: true
236
+ ` ` `
237
+
238
+ # ## `delegate` access rule example
239
+
240
+ ` ` ` sh
241
+ cat ./rules.json
242
+
243
+ [{
244
+ "id": "some-id",
245
+ "upstream": {
246
+ "url": "http://my-backend-service"
247
+ },
248
+ "match": {
249
+ "url": "http://my-app/some-route",
250
+ "methods": [
251
+ "GET"
252
+ ]
253
+ },
254
+ "authenticators": [{
255
+ "handler": "delegate"
256
+ }]
257
+ }]
258
+
259
+ curl -X GET http://my-app/some-route
260
+
261
+ HTTP/1.0 200 Status OK
262
+ The request has been allowed!
263
+ ` ` `
264
+
218
265
# # `cookie_session`
219
266
220
267
The `cookie_session` authenticator will forward the request method, path and headers to a session store. If the session store
0 commit comments