# Backend/API Integration

If your API or backend service needs authentication, you can validate the session in your application server code. Each request from the client to your application server should contain an access token or a cookie. Your backend server should validate them for each HTTP request.

There are different approaches to verify the requests based on whether you validate JWT (JSON Web Tokens) in your server, or forward authentication to Authgear Resolver Endpoint.

|                           | Validate JSON Web Token (JWT) in your application server                                                                                                                   | Forward Authentication to Authgear Resolver Endpoint                                                                   |
| ------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------- |
| Reliability               | <p><strong>Medium</strong><br>JWT only updates when expire. That means before the token expiry, your application may see the user is valid even they has been disabled</p> | <p><strong>High</strong><br>Update near real-time, based on your reserve proxy cache setting</p>                       |
| Integration difficulties  | <p><strong>Easy</strong><br>You only need to add code in your application to validate and decode JWT</p>                                                                   | <p><strong>Medium</strong><br>Need to setup extra reverse proxy to resolve authentication information</p>              |
| Transportation of session | **Access Token** in `Authorization` header                                                                                                                                 | <p><strong>Session ID</strong> in Cookies or<br><strong>Access Token</strong> in <code>Authorization</code> header</p> |

## Simple: Validate JWT in your server

Authgear uses [JSON Web Token (JWT)](https://jwt.io/?_gl=1*1ybgym6*rollup_ga*MTI1NDM1NjUwMy4xNjg3NzEyNTIz*rollup_ga_F1G3E656YZ*MTY5MTEzNjEzNS45NS4xLjE2OTExMzYxNDguNDcuMC4w*_ga*MTI1NDM1NjUwMy4xNjg3NzEyNTIz*_ga_QKMSDV5369*MTY5MTEzNjEzNS44Ny4xLjE2OTExMzYxNDguNDcuMC4w&_ga=2.165043391.1472871049.1691063710-1254356503.1687712523) for secure data transmission, authentication, and authorization.

{% @mermaid/diagram content="sequenceDiagram
autonumber
participant app as Mobile/Single Page Application
app->>Authgear: User authenticates with Authgear
Authgear-->>app: Access token & refresh token
participant server as Your app server
app->>server: User sends request with access token
server->>server: Verify request
server -->> app: Server responds with requested information" %}

Authgear returns the `access token` and `refresh token` to the client app after authentication. Your client app should call the backend with the access token in the Authorization header. The tokens should be parsed and validated in the backend server to ensure they are not compromised and the signature is authentic.

Request example:

```bash
> GET /api_path HTTP/1.1
> Host: yourdomain.com
> Authorization: Bearer <AUTHGEAR_ACCESS_TOKEN_IN_JWT>
```

Read more on [Validate JWT in your application server](/get-started/backend-api/jwt.md) guide.

{% content-ref url="/pages/NBU5LasbVvo4StH1QZjP" %}
[Validate JWT in your backend](/get-started/backend-api/jwt.md)
{% endcontent-ref %}

## Advanced: Forward Authentication to Authgear Resolver Endpoint

Forward Authentication is a process where an intermediate **reverse** **proxy or API Gateway** is responsible for authenticating a request before it reaches the intended application or service. This can add an extra layer of security and centralize the authentication logic. An intermediate service forwards each incoming HTTP request to the Authgear Resolver Endpoint to verify the access token or cookie in the HTTP header.

Read more on [Forward Authentication to Authgear Resolver Endpoint](/get-started/backend-api/nginx.md) guide.

### Forward Access Token in Authorization Header

{% @mermaid/diagram content="sequenceDiagram
autonumber
Browser ->> Authgear: User authenticate with Authgear
Authgear -->> Browser: Access token and refresh token
Browser ->> Reverse Proxy: Request with access token
participant Resolver as Authgear Resolver Endpoint
rect rgb(191, 223, 255)
note left of Resolver: Verify access token
Reverse Proxy ->> Resolver: Forward request authorization header
Resolver -->> Reverse Proxy: Response with "x-authgear-headers"
end
participant App as Your app server
Reverse Proxy ->> App: Pass request with updated headers
App -->> Reverse Proxy: Response
Reverse Proxy -->> Browser: Response
" %}

Instead of validating the access token in the backend, a reverse proxy forwards the request to an [Authgear Resolver Endpoint](/get-started/backend-api/nginx.md#authgear-resolver-endpoint). This endpoint resolves and verifies the access token in the **Authorization Header** of the request.

### Forward Cookie in HTTP header

{% @mermaid/diagram content="sequenceDiagram
autonumber
Browser ->> Authgear: User authenticate with Authgear
Authgear -->> Browser: Authgear sets cookies
Browser ->> Reverse Proxy: Request with cookies
participant Resolver as Authgear Resolver Endpoint
rect rgb(191, 223, 255)
note left of Resolver: Verify cookie
Reverse Proxy ->> Resolver: Forward request cookie header
Resolver -->> Reverse Proxy: Response with "x-authgear-headers"
end
participant App as Your app server
Reverse Proxy ->> App: Pass request with updated headers
App -->> Reverse Proxy: Response
Reverse Proxy -->> Browser: Response
" %}

In this approach, instead of validating the token in authorization header, Authgear returns `Set-Cookie` headers and sets cookies to the browser. The cookies are HTTP only and share under the same root domains. So you will need to setup the **custom domain** for Authgear, such as `identity.yourdomain.com`.

If you have multiple applications under `yourdomain.com`, all applications would share the same session cookie automatically. After that, you can verify the cookies using the [Resolver Endpoint](/get-started/backend-api/nginx.md).

Request example:

```javascript
> GET /api_path HTTP/1.1
> Host: yourdomain.com
> cookie: session=<AUTHGEAR_SESSION_ID>
```


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.authgear.com/get-started/backend-api.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
