limes authenticates users.
Category | Status |
---|---|
Version | |
Dependencies | |
Dev dependencies | |
Build | |
License |
$ npm install limes
First you need to add a reference to limes in your application:
const Limes = require('limes').default;
If you use TypeScript, use the following code instead:
import Limes from 'limes';
Now you need to create one or more identity providers. For each identity provider call the Limes.IdentityProvider
constructor and hand over the issuer
as well as a privateKey
or a certificate
, each in .pem
format. Optionally, you may provide both:
const identityProvider = new Limes.IdentityProvider({
issuer: 'https://auth.thenativeweb.io',
privateKey: await readFile(path.join(__dirname, 'privateKey.pem')),
certificate: await readFile(path.join(__dirname, 'certificate.pem'))
});
Please note that you have to specify the private key if you want to issue tokens and the certificate if you want to verify them.
Then you can call the Limes
constructor function to create a new limes instance. Hand over an array of one or more of the previously created identity providers:
const limes = new Limes({
identityProviders: [ identityProvider ]
});
To issue a token call the issueToken
function and provide the issuer
and the subject
you want to use as well as an optional payload:
const token = limes.issueToken({
issuer: 'https://auth.thenativeweb.io',
subject: 'jane.doe',
payload: {
'https://auth.thenativeweb.io/email': 'jane.doe@thenativeweb.io'
}
});
Please note that the issuer must match one of the registered identity providers. Otherwise, issueToken
will throw an error.
From time to time, e.g. for testing, you may want to get a JSON object that looks like a decoded token, but avoid the effort to create a signed token first. For this, use the static issueUntrustedToken
function and hand over the desired issuer
, the subject
, and an optional payload
:
const { token, decodedToken } = Limes.issueUntrustedToken({
issuer: 'https://untrusted.thenativeweb.io',
subject: 'jane.doe'
});
Please note that this is highly insecure, and should never be used for production code!
To verify a token call the verifyToken
function and provide the token. This function tries to verify and decode the token using the identity provider that matches the token's iss
value and returns the decoded token:
const decodedToken = await limes.verifyToken({ token });
If no identity provider for the token's iss
value is found, an exception is thrown. Also, an exception is thrown if the token is invalid.
To verify tokens in web applications, there is a middleware for Express. To use it call the verifyTokenMiddleware
function and hand over a made-up issuer value you want to use for anonymous tokens:
app.use(limes.verifyTokenMiddleware({
issuerForAnonymousTokens: 'https://anonymous.thenativeweb.io'
}));
Please note that the issuer for anonymous tokens is made-up, and does not provide any security. It's just a string that is used without further validation.
The middleware expects the token to be inside the authorization
HTTP header, prefixed with the term Bearer
:
authorization: Bearer <token>
Alternatively, you may transfer the token using the query string parameter token
:
GET /foo/bar?token=<token>
Either way, the verified and decoded token will be attached to the req.user
property, while the original token will be attached to the req.token
property:
const app = express();
app.use(limes.verifyTokenMiddleware({
issuerForAnonymousTokens: 'https://anonymous.thenativeweb.io'
}));
app.get('/', (req, res) => {
res.json({ user: req.user, token: req.token });
});
If a request does not provide a token, a token for an anonymous user will be issued. This issue uses anonymous
for the sub
property, and the aforementioned issuer for anonymous tokens.
Please make sure that your application code handles anonymous users in an intended way! The middleware does not block anonymous users, it just identifies and marks them!
If a request does have an invalid token, an expired one, or one from an unknown issuer, the middleware returns the status code 401
.
$ npx roboter