Analytics Retention: Control how long authentication analytics are stored (options: 30, 90, 180, 360 days, or Forever)
Setting Analytics Retention to “Forever” may significantly increase your database size over time, depending on your site’s traffic and authentication activity. Consider using a finite retention period for optimal performance.
Delete on Deactivation: Choose whether to remove all plugin data upon deactivation (default: true)
When Delete on Deactivation is enabled, all plugin data will be permanently deleted upon plugin deactivation. This action cannot be undone, and data can only be recovered if you have a database backup prior to deactivation.
Anonymize IP: Option to anonymize IP addresses in analytics data (default: false)
Max Requests: Maximum number of requests allowed in the time window (default: 60)
Window Minutes: Time window for rate limiting in minutes (default: 1)
Rate limit headers included in responses, this can be diasable via Filters.
Copy
X-RateLimit-Limit: Maximum requests allowedX-RateLimit-Remaining: Remaining requests in current windowX-RateLimit-Reset: Timestamp when the rate limit resetsRetry-After: Seconds to wait when rate limit is exceeded
By default, JWT Auth Pro uses HS256 (HMAC SHA-256) for token signing. You can switch to RS256 (RSA SHA-256) for enhanced security, especially in distributed systems.
Add these filters to your theme’s functions.php or a custom plugin:
Copy
// Set the algorithm to RS256add_filter('jwt_auth_algorithm', function($algorithm) { return 'RS256';});// Set the private key for token signingadd_filter('jwt_auth_secret_private_key', function($key) { return file_get_contents(ABSPATH . 'path/to/private.key');});// Set the public key for token validationadd_filter('jwt_auth_secret_public_key', function($key) { return file_get_contents(ABSPATH . 'path/to/public.key');});
Store your keys securely and never commit them to version control. Consider using environment variables or WordPress constants in wp-config.php to store the key paths.
While using key strings directly in code is possible, it’s recommended to store them in secure environment variables or files for better security and key management.
Asymmetric Encryption: Different keys for signing and verification
Better Security: Private key can be kept secret on the authentication server
Scalability: Public key can be distributed to multiple verification servers
Standard Compliance: Widely used in enterprise applications
All configuration options can be managed through the WordPress admin interface at Settings > JWT Auth Pro. The constants in wp-config.php are optional and will override the settings in the admin interface if defined.