Overview
Last updated
Last updated
A request is considered “authenticated” when the backend can securely identify the user and device that is making the request. The reasons for making authenticated requests to the backend include:
Associating the user with the action being performed
Ensuring the user has permission to make the request
Keeping an audit log of which device the user is performing actions from
In order to authenticate the user on the backend using OneAuxilia's SDK, the short-lived needs to be passed to the server.
To make authenticated requests from the frontend, the approach differs based on whether your client and server are on the same origin.
The origin includes the protocol, hostname, and port (optional):
For same-origin requests, refer to our guide on .
For cross-origin requests, refer to our guide on .
OneAuxilia provides various middleware packages to set the session property for easy access. These packages can also require a session to be available on the current request. Choose the guide based on the language or framework you're using:
NodeJs/Express
Golang (Comming Soon)
Python (Comming Soon)
Java (Comming Soon)
.NET (Comming Soon)
If there is not middleware available for your preferred language or framework, you can extract the session token manually or using Open API.
For same-origin requests, the session token is included in the __session
cookie and you can use an open source library to parse the cookie on the back-end.
For cross-origin requests, the Bearer token inside the Authorization
header contains the session token.
The following headers are required for Clerk to authenticate a request. It contains information that Clerk uses to determine whether a request is in a signed in or signed out state, or if a handshake must be performed.
You can read more about for additional information.
Alternatively, you can use