Authentication / authorization

Both the gRPC and the JSON REST interface are protected by an authentication and authorization meganism. For this JSON web-tokens are used, using the --jwt-secret / JWT_SECRET value for signing. Therefore it is important to choose an unique and strong secret.

To generate a random secret, you could use the following command:

openssl rand -base64 32

Example claim:

	"iss": "lora-app-server",      // issuer of the claim
	"aud": "lora-app-server",      // audience for which the claim is intended
	"nbf": 1489566958,             // unix time from which the token is valid
	"exp": 1489653358,             // unix time when the token expires
	"sub": "user",                 // subject of the claim (an user)
	"username": "admin"            // username the client claims to be

Setting the authentication token


When using gRPC, the JWT token needs to be stored in the authorization key of the request metadata. For example in Go, this can be done by the grpc.WithPerRPCCredentials method.


For requests to the RESTful JSON interface, you need to set the JWT token using the Grpc-Metadata-Authorization header field. The token needs to be present for each request.