Stateless Sessions with JWT

The Fusion API gateway requires incoming requests to be authenticated. The gateway supports a number of authentication mechanisms, including SAML, OIDC, basic auth, and Kerberos. Once authenticated, the gateway issues a JWT and returns it in the id cookie. Client applications will get the best performance by using the id cookie (or JWT Authorization header) instead of using Basic Auth for every query request because hashing a password is CPU intensive and slow by design (we use bcrypt), whereas verifying a JWT is fast and safe to cache. We show an example of this in Query Load Tests with Gatling, including how to refresh the JWT before it expires.

All Fusion services require requests to include a JWT to identify the caller.