quankim / cakephp-jwt-auth
QuanKim/JwtAuth plugin for CakePHP 3
Installs: 179
Dependents: 1
Suggesters: 0
Security: 0
Stars: 0
Watchers: 2
Forks: 0
Type:cakephp-plugin
Requires
- php: >=5.4.16
- quankim/php-jwt: *
Requires (Dev)
This package is not auto-updated.
Last update: 2024-11-09 19:45:44 UTC
README
Installation
You can install this plugin into your CakePHP application using composer.
The recommended way to install composer packages is:
composer require quankim/cakephp-jwt-auth
Usage
In your app's config/bootstrap.php
add:
// In config/bootstrap.php Plugin::load('QuanKim/JwtAuth');
or using cake's console:
./bin/cake plugin load QuanKim/JwtAuth
Migrate AuthToken table:
./bin/cake migrations migrate -p QuanKim/JwtAuth
Configuration:
Setup AuthComponent
:
// In your controller, for e.g. src/Api/AppController.php public function initialize() { parent::initialize(); $this->loadComponent('Auth', [ 'storage' => 'Memory', 'authenticate', [ 'QuanKim/JwtAuth.Jwt' => [ 'userModel' => 'Users', 'fields' => [ 'username' => 'id' ], 'parameter' => 'token', // Boolean indicating whether the "sub" claim of JWT payload // should be used to query the Users model and get user info. // If set to `false` JWT's payload is directly returned. 'queryDatasource' => true, ] ], 'unauthorizedRedirect' => false, 'checkAuthIn' => 'Controller.initialize', // If you don't have a login action in your application set // 'loginAction' to false to prevent getting a MissingRouteException. 'loginAction' => false ]); }
Setup Config/app.php
Add in bottom of file:
'AuthToken'=>[ 'expire'=>3600 ]
Working
The authentication class checks for the token in two locations:
-
HTTP_AUTHORIZATION
environment variable:It first checks if token is passed using
Authorization
request header. The value should be of formBearer <token>
. TheAuthorization
header name and token prefixBearer
can be customzied using optionsheader
andprefix
respectively.Note: Some servers don't populate
$_SERVER['HTTP_AUTHORIZATION']
whenAuthorization
header is set. So it's upto you to ensure that either$_SERVER['HTTP_AUTHORIZATION']
or$_ENV['HTTP_AUTHORIZATION']
is set.For e.g. for apache you could use the following:
RewriteEngine On RewriteCond %{HTTP:Authorization} ^(.*) RewriteRule .* - [e=HTTP_AUTHORIZATION:%1]
-
The query string variable specified using
parameter
config:Next it checks if the token is present in query string. The default variable name is
token
and can be customzied by using theparameter
config shown above.
Token Generation
You can use \Firebase\JWT\JWT::encode()
of the firebase/php-jwt
lib, which this plugin depends on, to generate tokens.
The payload should have the "sub" (subject) claim whos value is used to query the Users model and find record matching the "id" field.
Example:
$access_token = JWT::encode([ 'sub' => $user['id'], 'exp' => time() + $expire ],Security::salt()); $refresh_token = JWT::encode([ 'sub' => $user['id'], 'ref'=>time() ],Security::salt()); $authToken = $this->Users->AuthToken->newEntity(); $authToken->user_id = $user['id']; $authToken->access_token = $access_token; $authToken->refresh_token = $refresh_token; $this->Users->AuthToken->save($authToken); $this->set([ 'success' => true, 'data' => [ 'access_token' => $access_token, 'refresh_token'=> $refresh_token, 'id'=>$user['id'], 'username'=> $user['username'], 'email'=> $user['email'] ], '_serialize' => ['success', 'data'] ]);
You can set the queryDatasource
option to false
to directly return the token's
payload as user info without querying datasource for matching user record.
Further reading
For an end to end usage example check out this blog post by Bravo Kernel.