Authentication
Auth
JWT-based
Token types
Section titled “Token types”The Edge Connector uses JWTs issued by the nara platform that carry:
- the organization the connector belongs to
- the user or service identity
- an admin role for the organization (required for most operations)
Tokens are stored locally in auth-token.json (or a custom path) and reused by both the CLI and the runtime.
Authenticating the CLI (server mode)
Section titled “Authenticating the CLI (server mode)”-
Obtain an admin token for your organization from the nara webapp (API token, service principal, or similar).
-
On the target machine, run:
Terminal window edge-connector auth --token "<ADMIN_JWT>" -
The CLI validates the token (organization, role, expiry) and writes
auth-token.jsonnext to your config (or to the path fromAUTH_TOKEN_PATH).
Desktop authentication flow
Section titled “Desktop authentication flow”Desktop connectors automate authentication:
- The runtime starts without a token and calls a desktop auth endpoint on the platform.
- The user is redirected to a browser flow for sign‑in and org selection.
- Once approved, the platform issues a token tied to the user and org.
- The runtime stores the token via
auth-token.jsonand reuses it until it expires.
If the token expires the runtime automatically refreshes it using the same flow (or a test-mode provisioning mechanism in automated environments).
Rotating and revoking tokens
Section titled “Rotating and revoking tokens”-
To rotate, generate a new admin token in the webapp and re-run:
Terminal window edge-connector auth --token "<NEW_ADMIN_JWT>" -
To revoke a token:
- disable or delete it from the webapp’s admin surface, and
- clear the local token file (for example by deleting
auth-token.jsonon the connector host).