There is a Bearer authorization (https://datatracker.ietf.org/doc/html/rfc6750) used in oauth2 and SAML security protocols. There are some cases when access to DB is organized thru proxy that keeps real credentials to a DB and authenticates each request. In such cases something like JWT is used what is one of uses cases for Bearer schema. So:
Client should have a configuration method to pass "Bearer" token
Token should be send via Authorization header of an HTTP request
Description
There is a Bearer authorization (https://datatracker.ietf.org/doc/html/rfc6750) used in oauth2 and SAML security protocols. There are some cases when access to DB is organized thru proxy that keeps real credentials to a DB and authenticates each request. In such cases something like JWT is used what is one of uses cases for Bearer schema. So: