GRAPHQL_JWT_SECRET_KEY
. If you plug a Ghostwriter JWT into a debugger like the one at https://jwt.io/, you will see something similar to the following:login
mutation, a type of GraphQL query that performs a server-side action. The resulting JWT holds the same privileges as the authenticated user.Authorization
header of future requests.JWT_EXPIRATION_DELTA
to a new time delta (e.g., timedelta(hours=8)
).login
mutation is they have user-defined expiration dates. They are intended to be used for long-running automation tasks, like operational logging. If an expiration date is not set they do not expire until revoked.Authorization
header: Authorization: Bearer TOKEN
200 OK
response with your requested data.401 Unauthorized
response with an error like this:public
role with the username anonymous
. This is not a real user or role and is only used to manage access to resources designed to be accessed without authentication.anonymous
user is the Login
mutation.