quankim / cakephp-jwt-auth
QuanKim/JwtAuth plugin for CakePHP 3
Installs: 181
Dependents: 1
Suggesters: 0
Security: 0
Stars: 0
Watchers: 1
Forks: 0
Type:cakephp-plugin
pkg:composer/quankim/cakephp-jwt-auth
Requires
- php: >=5.4.16
 - quankim/php-jwt: *
 
Requires (Dev)
This package is not auto-updated.
Last update: 2025-10-26 01:17:11 UTC
README
Installation
You can install this plugin into your CakePHP application using composer.
The recommended way to install composer packages is:
composer require quankim/cakephp-jwt-auth
Usage
In your app's config/bootstrap.php add:
// In config/bootstrap.php Plugin::load('QuanKim/JwtAuth');
or using cake's console:
./bin/cake plugin load QuanKim/JwtAuth
Migrate AuthToken table:
./bin/cake migrations migrate -p QuanKim/JwtAuth
Configuration:
Setup AuthComponent:
// In your controller, for e.g. src/Api/AppController.php public function initialize() { parent::initialize(); $this->loadComponent('Auth', [ 'storage' => 'Memory', 'authenticate', [ 'QuanKim/JwtAuth.Jwt' => [ 'userModel' => 'Users', 'fields' => [ 'username' => 'id' ], 'parameter' => 'token', // Boolean indicating whether the "sub" claim of JWT payload // should be used to query the Users model and get user info. // If set to `false` JWT's payload is directly returned. 'queryDatasource' => true, ] ], 'unauthorizedRedirect' => false, 'checkAuthIn' => 'Controller.initialize', // If you don't have a login action in your application set // 'loginAction' to false to prevent getting a MissingRouteException. 'loginAction' => false ]); }
Setup Config/app.php
Add in bottom of file:
'AuthToken'=>[ 'expire'=>3600 ]
Working
The authentication class checks for the token in two locations:
- 
HTTP_AUTHORIZATIONenvironment variable:It first checks if token is passed using
Authorizationrequest header. The value should be of formBearer <token>. TheAuthorizationheader name and token prefixBearercan be customzied using optionsheaderandprefixrespectively.Note: Some servers don't populate
$_SERVER['HTTP_AUTHORIZATION']whenAuthorizationheader is set. So it's upto you to ensure that either$_SERVER['HTTP_AUTHORIZATION']or$_ENV['HTTP_AUTHORIZATION']is set.For e.g. for apache you could use the following:
RewriteEngine On RewriteCond %{HTTP:Authorization} ^(.*) RewriteRule .* - [e=HTTP_AUTHORIZATION:%1] - 
The query string variable specified using
parameterconfig:Next it checks if the token is present in query string. The default variable name is
tokenand can be customzied by using theparameterconfig shown above. 
Token Generation
You can use \Firebase\JWT\JWT::encode() of the firebase/php-jwt
lib, which this plugin depends on, to generate tokens.
The payload should have the "sub" (subject) claim whos value is used to query the Users model and find record matching the "id" field.
Example:
$access_token = JWT::encode([ 'sub' => $user['id'], 'exp' => time() + $expire ],Security::salt()); $refresh_token = JWT::encode([ 'sub' => $user['id'], 'ref'=>time() ],Security::salt()); $authToken = $this->Users->AuthToken->newEntity(); $authToken->user_id = $user['id']; $authToken->access_token = $access_token; $authToken->refresh_token = $refresh_token; $this->Users->AuthToken->save($authToken); $this->set([ 'success' => true, 'data' => [ 'access_token' => $access_token, 'refresh_token'=> $refresh_token, 'id'=>$user['id'], 'username'=> $user['username'], 'email'=> $user['email'] ], '_serialize' => ['success', 'data'] ]);
You can set the queryDatasource option to false to directly return the token's
payload as user info without querying datasource for matching user record.
Further reading
For an end to end usage example check out this blog post by Bravo Kernel.