ðŸĪĐVerify Access Token

By verifying the access token, the system can ensure that the token is valid and was issued by a trusted party. This can prevent unauthorized access and help to maintain the security and integrity of the system and its data.

Request

query verify {
  verifyAccessToken(input: {accessToken: "eyJraWQiOiJSNDFFTVlzc3JCaERzc0M2WElScDZFd0NaUGt3ZUpYT2tTNFlyeFFmUDd3PSIsImFsZyI6IlJTMjU2In0.eyJzdWIiOiIyMzVlMzFmMy1jYTlkLTRjNTYtOTczZi1mYzVjZjJkYTZkMTAiLCJpc3MiOiJodHRwczpcL1wvY29nbml0by1pZHAuYXAtbm9ydGhlYXN0LTEuYW1hem9uYXdzLmNvbVwvYXAtbm9ydGhlYXN0LTFfbzN5VjB2TnZ2IiwiY2xpZW50X2lkIjoiNmw3cHZ1MDZ1bjFscTFqbG90NnNnN2Y3M2giLCJvcmlnaW5fanRpIjoiM2RjZjA0MTAtMzExYi00NDI5LTg4OTctNzI2ZjI5YTljZmU3IiwiZXZlbnRfaWQiOiI3MDM5ZWZlMC0yNzhiLTQ0MmYtYmIwNC0xNjU5MGE3NDkwYmQiLCJ0b2tlbl91c2UiOiJhY2Nlc3MiLCJzY29wZSI6ImF3cy5jb2duaXRvLnNpZ25pbi51c2VyLmFkbWluIiwiYXV0aF90aW1lIjoxNjc3MTQ1MTU4LCJleHAiOjE2NzcxNDY5NTgsImlhdCI6MTY3NzE0NTE1OCwianRpIjoiOWI4ZDAzOWMtMWIwMS00NjM5LTg2MmItYWU5ZTkwODQ4ODVjIiwidXNlcm5hbWUiOiJ6YWsifQ.EeVMgHXxuP-3UZjZHrjpcPqnFXtxMFQB16XbfFI-67kaLqAtNP0hLUWfdsZ80J6KwLYk6h1vwlVnMxM3SDUWlG4zUoLUI8NH22L8o7Kf7lwxexnKCHYnVvNnri1IqIpsGUCw9LE0sWtmHG8IX3o4AxzFB9AhgeOoLaEkXXxWmSZfIlDJFOCiiLhUrys2XPjrkrdgJI89EX38rwkBeerv8MgR0tze_sIZtb2xh38HMwqWrQk9T0dm3lgmsfgXKcbxih_I8WiY_ZT1z_jXjs6dB6tCyCLYXsaCisqS9oSaicbTlaL3mzrtXk_7OLaKampiquqltjVyOX-8ntKoOnYyOA"}) {
    verify
  }
}

Response

{
  "data": {
    "verifyAccessToken": {
      "verify": true
    }
  }
}

Last updated