Skip to content

Commit 37fa12d

Browse files
committed
docs(user-guide): Reword authentication to authorization
1 parent 546a280 commit 37fa12d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

docs/user-guide/route-level-auth.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
# Route-Level Auth
1+
# Route-Level Authorization
22

3-
Route-level authentication and authorization can provide a base layer of security for the simplest use cases. This typically looks like:
3+
Route-level authorization can provide a base layer of security for the simplest use cases. This typically looks like:
44

55
- the entire catalog being private, available only to authenticated users
66
- most of the catalog being public, available to anonymous or authenticated users. However, a subset of endpoints (typically the [transactions extension](https://github.com/stac-api-extensions/transaction) endpoints) are only available to all or a subset of authenticated users
77

88
## Configuration Variables
99

10-
Route-level authentication is controlled by three key environment variables:
10+
Route-level authorization is controlled by three key environment variables:
1111

1212
- **[`DEFAULT_PUBLIC`](../../configuration/#default_public)**: Sets the default access policy for all endpoints
1313
- **[`PUBLIC_ENDPOINTS`](../../configuration/#public_endpoints)**: Marks endpoints as not requiring authentication (used only when `DEFAULT_PUBLIC=false`). By default, we keep the catalog root, OpenAPI spec, Swagger UI, Swagger UI auth redirect, and the proxy health endpoint as public. Note that these are all endpoints that don't serve actual STAC data; they only acknowledge the presence of a STAC catalog. This is defined by a mapping of regex path expressions to arrays of HTTP methods.

0 commit comments

Comments
 (0)