Hello World API: Actix Web + Rust Sample

This sample uses actix-web-httpauth and jsonwebtoken to implement the following security tasks:

The add-authorization branch offers a working API server that exposes a public endpoint along with two protected endpoints. Each endpoint returns a different type of message: public, protected, and admin.

The GET /api/messages/protected and GET /api/messages/admin endpoints are protected against unauthorized access. Any requests that contain a valid access token in their authorization header can access the protected and admin data.

However, you should require that only access tokens that contain a read:admin-messages permission can access the admin data, which is referred to as Role-Based Access Control (RBAC).

Check out the add-rbac branch to see authorization and Role-Based Access Control (RBAC) in action using Auth0.

Quick Auth0 Set Up

Set up the project

The recommended way to install Rust is via Rustup, follow the instructions here.

Install the toolchain:

rustup toolchain install 1.56

Install the project dependencies:

cargo build

Install the project dependencies:

Create .env file under the project directory:

touch .env

Populate .env as follows:

PORT=6060
CLIENT_ORIGIN_URL=http://localhost:4040
AUTH0_AUDIENCE=
AUTH0_DOMAIN=

Register a(n) Actix Web API with Auth0

  • Open the APIs section of the Auth0 Dashboard.

  • Click on the Create API button.

  • Provide a Name value such as Hello World API Server.

  • Set its Identifier to https://api.example.com or any other value of your liking.

  • Leave the signing algorithm as RS256 as it's the best option from a security standpoint.

  • Click on the Create button.

View "Register APIs" document for more details.

Connect Actix Web with Auth0

Get the values for AUTH0_AUDIENCE and AUTH0_DOMAIN in .env from your Auth0 API in the Dashboard.

Head back to your Auth0 API page, and follow these steps to get the Auth0 Audience:

Get the Auth0 Audience to configure an API

  1. Click on the "Settings" tab.

  2. Locate the "Identifier" field and copy its value.

  3. Paste the "Identifier" value as the value of AUTH0_AUDIENCE in .env.

Now, follow these steps to get the Auth0 Domain value:

Get the Auth0 Domain to configure an API

  1. Click on the "Test" tab.
  2. Locate the section called "Asking Auth0 for tokens from my application".
  3. Click on the cURL tab to show a mock POST request.
  4. Copy your Auth0 domain, which is part of the --url parameter value: tenant-name.region.auth0.com.
  5. Paste the Auth0 domain value as the value of AUTH0_DOMAIN in .env.

Tips to get the Auth0 Domain

  • The Auth0 Domain is the substring between the protocol, https:// and the path /oauth/token.

  • The Auth0 Domain follows this pattern: tenant-name.region.auth0.com.

  • The region subdomain (au, us, or eu) is optional. Some Auth0 Domains don't have it.

Run the project

With the .env configuration values set, run the API server by issuing the following command:

cargo run

Test the Protected Endpoints

You can get an access token from the Auth0 Dashboard to test making a secure call to your protected API endpoints.

Head back to your Auth0 API page and click on the "Test" tab.

Locate the section called "Sending the token to the API".

Click on the cURL tab of the code box.

Copy the sample cURL command:

curl --request GET \
  --url http://path_to_your_api/ \
  --header 'authorization: Bearer really-long-string-which-is-test-your-access-token'

Replace the value of http://path_to_your_api/ with your protected API endpoint path (you can find all the available API endpoints in the next section) and execute the command. You should receive back a successful response from the server.

You can try out any of our full stack demos to see the client-server Auth0 workflow in action using your preferred front-end and back-end technologies.

API Endpoints

🔓 Get public message

GET /api/messages/public

Response

Status: 200 OK
{
  "api": "api_actix-web_rust_hello-world",
  "branch": "basic-authorization",
  "text": "The secured API doesn't require an access token to share this public message.",
}

🔐 Protected Endpoints: These endpoints require the request to include an access token issued by Auth0 in the authorization header.

🔐 Get protected message

GET /api/messages/protected

Response

Status: 200 OK
{
  "api": "api_actix-web_rust_hello-world",
  "branch": "basic-authorization",
  "text": "The secured API requires a valid access token to share this protected message."
}

🔐 Get admin message

You need to protect this endpoint using Role-Based Access Control (RBAC).

GET /api/messages/admin

Response

Status: 200 OK
{
  "api": "api_actix-web_rust_hello-world",
  "branch": "basic-authorization",
  "text": "The secured API requires a valid access token to share this admin message."
}

Error Handling

400s errors

Response

Status: Corresponding 400 status code
{
  "message": "Message that describes the error that took place."
}

500s errors

Response

Status: 500 Internal Server Error
{
  "message": "Message that describes the error that took place."
}