Supertab Connect integrates with Fastly for two purposes: serving your RSL license atDocumentation Index
Fetch the complete documentation index at: https://connect-docs.supertab.co/llms.txt
Use this file to discover all available pages before exploring further.
/license.xml via your domain, and enforcing the Crawler Authentication Protocol (CAP) to protect content from unlicensed crawlers.
RSL License Deployment
Your RSL license needs to be accessible athttps://yourdomain.com/license.xml. Fastly proxies this path to the Supertab Connect origin, keeping the URL on your domain.
The configuration differs slightly between VCL and Compute services.
VCL Service
Add a backend pointing to the Supertab Connect origin, attach it to a condition that matches the license URL, and add a VCL snippet that rewrites the short path to the full URN path.Backend
Add a new host with the following configuration:Condition
Attach a request condition tosupertab-connect-backend:
VCL Snippet
Add arecv snippet at priority 100:
api-connect.supertab.co.
Activate the new version once the backend, condition, and snippet are in place.
Compute (Wasm) Service
For Compute services, add a backend namedsupertab-connect-backend pointing to api-connect.supertab.co:443 with TLS enabled. The SDK handles URL rewriting and routing internally when enableRSL: true is set — no VCL condition or snippet is needed.
CAP Enforcement
CAP validates theAuthorization: License <token> header on crawler requests, verifying that the crawler holds a valid license before allowing access to protected content.
Depending on your existing infrastructure, choose one of two integration patterns.
| Approach | Description | Best for |
|---|---|---|
| Compute-native | All traffic enters a Fastly Compute service; the SDK handles detection, validation, and origin routing. | Greenfield projects or full Compute migrations. |
| Service chaining (CDN → Compute) | Your existing VCL service detects the Authorization: License header and chains licensed requests to a Compute service for validation. | Existing CDN services using VCL snippets. |
Approach 1: Compute-native
ThefastlyHandleRequests method manages the full request lifecycle. Use a Fastly SecretStore for the API key.
Enforcement modes
Bot detection
By default the SDK identifies known crawlers by their user agent. Pass abotDetector function to extend or override this logic.
Manual verification
For fine-grained control, useverifyAndRecord() directly instead of fastlyHandleRequests.
Approach 2: Service Chaining (CDN → Compute)
Use this when you already have a CDN service and only want licensed requests to detour through Compute. The CDN service does the routing via VCL snippets; the Compute service runs the SDK and then forwards to your normal origin.VCL snippets — vcl_recv amd vcl_pass
To reroute RSL-licensed requests to the Compute service, add a recv snippet:
supertab-compute-validator indicates the name of the host/backend that you must define in your Fastly CDN service.
It should lead to the automatically assigned Compute service’s domain (e.g., your-compute-service.edgecompute.app)
which you will create on the next step.
Additionally, create a pass snippet:
X-Original-Request-Url used to verify the aud claim from license token is included in the request to Compute service.
Without it CAP enforcement fails with insufficient_scope error as we are unable to confirm all properties required by RSL spec.
Note: keep the rest of your VCL flow intact so non-licensed traffic never leaves the CDN path.
Compute service
- A Secret Store called
supertab_configcontainingMERCHANT_API_KEYand linked to the Compute service - A backend for your real origin, passed as the third argument above (
origin_backend_name) - A Supertab backend with
stc-backendas the name (see VCL Service - Backend for an example config) - A host called
supertab-compute-validatorin the CDN service, using the Compute service’s autogenerated*.edgecompute.appdomain.
X-Original-Request-Url header is running before the request reaches Compute.