Supported Features
The following table lists the features that are supported by dedicated gateways.
| Feature Name | Feature Description | Configurable | Feature Configuration Example | Configuration Parameter | Parameter Description | Default Value | Value Range |
|---|---|---|---|---|---|---|---|
| lts | Reporting of Shubao access logs | Yes | {"name":"lts","enable":true,"config": "{\"group_id\": ",\"topic_id\":\"\",\"log_group\":\"\",\"log_stream\":\"\"}"} | group_id | Log group ID. | - | - |
| topic_id | Log stream ID. | - | - | ||||
| log_group | Name of a log group. | - | - | ||||
| log_stream | Name of a log stream. | - | - | ||||
| gateway_responses | Custom gateway responses | No | - | - | - | - | - |
| ratelimit | Request throttling limit configuration | Yes | {"name":"ratelimit","enable":true,"config": "{\"api_limits\": 500}"} | api_limits | Default request throttling value applied to all APIs. Set this parameter properly to meet service requirements. A small value may constantly throttle your services. | 200 calls per second | 1–1,000,000 calls per second |
| request_body_size | Configuration of the maximum request body size | Yes | {"name":"request_body_size","enable":true,"config": "104857600"} | request_body_size | Maximum size of the body allowed in an API request. | 12 M | 1-9536 M |
| backend_timeout | Backend timeout configuration | Yes | {"name":"backend_timeout","enable":true,"config": "{"max_timeout": 500}"} | max_timeout | Maximum timeout duration for APIC to access a backend service. | 60000 ms | 1-600000 ms |
| app_token | app_token authentication | Yes | {"name":"app_token","enable":true,"config": "{\"enable\": \"on\", \"app_token_expire_time\": 3600, \"app_token_uri\": \"/v1/apigw/oauth2/token\", \"refresh_token_expire_time\": 7200}"} | enable | Whether to enable app_token authentication. | off | on/off |
| app_token_expire_time | Validity period of the access token. | 3600 s | 1-72000 s | ||||
| refresh_token_expire_time | Validity period of the refresh token. | 7200 s | 1-72000 s | ||||
| app_token_uri | URI used for obtaining the token. | /v1/apigw/oauth2/token | - | ||||
| app_token_key | Token encryption key. | - | - | ||||
| app_api_key | app_api_key authentication | Yes | {"name":"app_api_key","enable":true,"config": "on"} | - | - | off | on/off |
| app_basic | app_basic authentication | Yes | {"name":"app_basic","enable":true,"config": "on"} | - | - | off | on/off |
| app_secret | app_secret authentication | Yes | {"name":"app_secret","enable":true,"config": "on"} | - | - | off | on/off |
| app_jwt | app_jwt authentication | Yes | {"name":"app_jwt","enable":true,"config": "{\"enable\": \"on\", \"auth_header\": \"Authorization\"}"} | enable | Whether to enable app_jwt authentication. | off | on/off |
| auth_header | app_jwt authentication header. | Authorization | - | ||||
| public_key | Public_key backend signatures | Yes | {"name":"public_key","enable":true,"config": "{\"enable\": \"on\", \"public_key_uri_prefix\": \"/apigw/authadv/v2/public-key/\"}"} | enable | Whether to enable app_jwt authentication. | off | on/off |
| public_key_uri_prefix | URI prefix used for obtaining the public key. | /apigw/authadv/v2/public-key/ | - | ||||
| backend_token_allow | Allowing tenants to transparently transmit tokens to the backend | Yes | {"name":"backend_token_allow","enable":true,"config": "{\"backend_token_allow_users\": [\"paas_apig_wwx548366_01\"]}"} | backend_token_allow_users | Regular expression for transparently transmitting the token to the common tenant whitelist of the tenant to match the domain name of the common tenant. | - | - |
| sign_basic | Basic signature keys | No | - | - | - | - | - |
| multi_auth | Two-factor authentication | No | - | - | - | - | - |
| backend_client_certificate | Backend two-way authentication | Yes | {"name":"backend_client_certificate","enable":true,"config": "{\"enable\": \"on\",\"ca\": \"\",\"content\": \"\",\"key\": \"\"}"} | enable | Whether to enable this feature. | off | on/off |
| ca | CA file of two-way authentication. | - | - | ||||
| content | Two-way authentication file. | - | - | ||||
| key | Private key of two-way authentication. | - | - | ||||
| ssl_ciphers | HTTPS cipher suites | Yes | {"name":"ssl_ciphers","enable":true,"config": "config": "{\"ssl_ciphers\": [\"ECDHE-ECDSA-AES256-GCM-SHA384\"]}"} | ssl_ciphers | Encryption and decryption suites supported. The ssl_ciphers parameter cannot be left blank and can contain only the options in the default value. | - | ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,ECDHE-ECDSA-AES128-GCM-SHA256,ECDHE-RSA-AES128-GCM-SHA256,ECDHE-ECDSA-AES256-SHA384,ECDHE-RSA-AES256-SHA384,ECDHE-ECDSA-AES128-SHA256,ECDHE-RSA-AES128-SHA256 |
| real_ip_from_xff | X-Forwarded-For header for identifying IP addresses during access control and request throttling | Yes | {"name": "real_ip_from_xff","enable": true,"config": {"enable": "on","xff_index": -1}} | enable | Whether to enable this feature. | off | on/off |
| xff_index | Sequence number of an IP address in the X-Forwarded-For header. The value of this parameter can be 0 or a positive or negative number. If the value is 0 or a positive number, the IP address of the corresponding index is obtained from the X-Forwarded-For header. If the value is a negative number, the IP address in reverse index order is obtained from the X-Forwarded-For header. For example, assume that the X-Forwarded-For header of a request received by API gateway contains three IP addresses: IP1, IP2, and IP3. If the value of xff_index is 0, IP1 is obtained. If the value of xff_index is 1, IP2 is obtained. If the value of xff_index is –1, IP3 is obtained. | -1 | Valid Int32 value |
Last Article: Error Codes
Next Article: Obtaining a Project ID

Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.