Token

The token access control rule allows access to a resource if the request includes a specific security token and is submitted via HTTPS.

This is often used to allow services, scripts or other tools to access resources when they are not going to be on a static IP address or the system is vulnerable to IP spoofing.

Properties

header: The name of the HTTP header that contains the token
value: The value of the token to search for. May be an array.

Example

{
   "type": "token",
   "header": "X-Access-Token",
   "list": ["token1","token1"]
}

This restricts access to only clients communicating via HTTPS and who include an 'X-Access-Token' header with the value 'token1' or 'token2'.