Authentication
Every Gooclaim API call requires a JWT (JSON Web Token) in the
Authorization header. Tokens are issued by the Auth Service and signed
with RS256.
Two token types
Gooclaim issues two kinds of tokens depending on who is calling:
Issued to a real user (TPA admin, claim handler) after login. Short-lived (15 min). Refreshable.
Issued to your backend service for server-to-server calls (e.g. CMS pull, webhook delivery). Short-lived (1 hour). Auto-rotated by your client SDK.
You’ll almost always use machine tokens for backend integrations. Human tokens are for the Portal and Copilot web apps.
Step 1 — Get your credentials
When your tenant is onboarded, you receive:
Rotate client_secret immediately if leaked — see
Support for the rotation flow.
Step 2 — Exchange credentials for a token
Response:
Tokens expire in 1 hour for machine tokens, 15 minutes for human tokens. Cache the token and re-request before expiry — do not retry on 401 in a loop.
Step 3 — Call any Gooclaim API
Send the token in the Authorization header:
Token verification (introspection)
To verify a token without parsing it yourself, call the introspect endpoint:
Response includes the token’s tenant_id, scope, exp, and active status.
JWT claims you’ll receive
Security rules
- Never put
client_secretin client-side code (browsers, mobile apps). - Never log full tokens. Log token IDs or a hash prefix only.
- Always verify the
audandissclaims if you parse tokens yourself. - Rotate
client_secretevery 90 days.
Rate limits
Exceeding the limit returns 429 Too Many Requests with a Retry-After header.
Next: call your first API
With a valid token, head to Workflows to query a workflow’s status.