Skip to main content

Advanced Guide

Application and development guides for each type of platform feature in real-world scenarios

📄️ Using Interceptors for Custom Request Authentication

When systems need to provide APIs for external partners, authentication is often required to restrict unauthorized access. JitAi's API authorization elements can implement exposing API interfaces to third parties (recommended approach), but this requires callers to use the client SDK provided by JitAi. When callers cannot use the SDK, you can use backend interceptors to implement custom authentication methods to accommodate different calling patterns. This document uses custom Bearer Token authentication as an example.