Go to the “Manage” tab in the UI.
Provide the name of the header which you wish to use as the authorization header, as shown below. In this example, it is defined as "Token".
- Save and publish the API.
- When you go to the developer portal(API Store), you will be able to see the portal is ready to send the new header to the gateway. Insttead of the usual "Authorization" header, you can see the "Token" header which was defined in the previous steps in the below screenshot.
If you want to invoke the API with curl, following is the command.
curl -k -X GET "<Your API URL>" -H "Accept: applicationApplication/json" -H "Token: Bearer <Your Token>"
Configuring the authorization header for the entire organization
Go to the management console of API Cloud. You will be logged in automatically.
Click Main, then click Browse under Resources.
/_system/config/apimgt/applicationdata/tenant-conf.jsonas the location. Click Go to access the
tenant-conf.json file in the WSO2 Registry.
- Click Edit as text to edit the JSON file.
Add the following configuration with the customized authorization header to the JSON file and save the file.
"AuthorizationHeader" : "<tenant-authorization-header>"
If you have APIs that were published already, go to the API publisher and re-publish those for the changes to take effect. The new APIs will automatically have this behaviour when they are created.
If you have configured this at both API level and organization level, then the API level configuration will get the precedence.
With this new feature is available in WSO2 API Cloud, you will be able to connect your legacy backends and legacy clients to the API gateway without worrying about the authorization header.