How to authenticate users access token with public key from keyclock

I have configured JWT based backend authentication to use keyclock users in config.yml

public key I have used from Keyclock server-> realmName->realm settings-> keys → RS256 → public key


        http_enabled: true
        transport_enabled: true
        order: 0
          type: jwt
          challenge: false
            signing_key: |-
              -----BEGIN PUBLIC KEY-----
              -----END PUBLIC KEY-----
            jwt_header: "Authorization"
            jwt_url_parameters: "jwttoken"
            roles_key: "roles"
            subject_key: "sub"
              - kibanaro
              - kibanaserver
              - logstash
              - admin
              - kibanauser
          type: noop


opendistro_security.auth.type: jwt
opendistro_security.jwt.url_param: jwttoken

I have created a token with API:

the created token is used for authenticating using curl command.
curl -XGET https://localhost:9200 -H “Application-Authorization: Bearer $access-token-from-above-call” -k

but curl gives output as

HTTP/1.1 401 Unauthorized
WWW-Authenticate: Basic realm="Open Distro Security"
content-type: text/plain; charset=UTF-8
content-length: 12

I have doubt, it should used WWW-Authenticate: Bearer , but its showing WWW-Authenticate: Basic realm=''Open Distro Security"

What can be the issue with the above procedure?

It may help someone, My issue is solved by adding jwt_token_type: “Bearer” in config.yml
below jwt_header key in config section.

            jwt_header: "Authorization"
            jwt_token_type: "Bearer"
            jwt_url_parameters: "jwttoken"
            roles_key: "roles"
            subject_key: "sub"