Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jwtk/njwt
Node.js JWT support
https://github.com/jwtk/njwt
Last synced: 25 days ago
JSON representation
Node.js JWT support
- Host: GitHub
- URL: https://github.com/jwtk/njwt
- Owner: jwtk
- License: apache-2.0
- Created: 2015-01-26T21:59:26.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2023-05-01T16:36:56.000Z (over 1 year ago)
- Last Synced: 2024-05-02T03:13:16.912Z (8 months ago)
- Language: JavaScript
- Homepage:
- Size: 507 KB
- Stars: 430
- Watchers: 9
- Forks: 48
- Open Issues: 51
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
- awesome-jwt - nJWT - Node.js JWT support. (Libraries / Node.js)
README
# nJwt - JWTs for Node.js
"Nin-Jot" /ˈnɪn.dʒɑt/
[![NPM Version](https://img.shields.io/npm/v/njwt.svg?style=flat)](https://npmjs.org/package/njwt)
[![NPM Downloads](https://img.shields.io/npm/dm/njwt.svg?style=flat)](https://npmjs.org/package/njwt)
[![Build Status](https://img.shields.io/travis/jwtk/njwt.svg?style=flat)](https://travis-ci.org/jwtk/njwt)
[![Coverage Status](https://coveralls.io/repos/jwtk/njwt/badge.svg?branch=master)](https://coveralls.io/r/jwtk/njwt?branch=master)nJwt is the cleanest JSON Web Token (JWT) library for Node.js developers. nJwt
removes all the complexities around JWTs, and gives you a simple, intuitive API,
that allows you to securely make and use JWTs in your applications without
needing to read [rfc7519](http://www.rfc-editor.org/rfc/rfc7519.txt).### Creating Secure, Signed JWTs
JWTs expect *"claims"*, they are a set of assertions about who the user is and what
they can do. The most common use case for JWTs is to declare the "scope" of the
access token, which is a list of things that the holder of the token (the user)
is allowed to do.JWTs should be signed, otherwise you can't verify that they were created by you.
Our library expects that you give us a highly random signing key for
signing tokens. We use the `HS256` algorithm by default, and the byte length of
the signing key should match that of the signing algorithm, to ensure cryptographic
security.While the library will accept strings for signing keys, we suggest you use a
Buffer instead. Using buffers makes it easy to do other operations, like
convert your signing key to Base64URL encoding, if you need to transmit your
key to other systems.While the claims are completely up to you, we do recommend setting the "Subject"
and "Audience" fields.JWTs commonly contain the `iat`, `nbf` and `exp` claims, which declare the time the
token was issued, activation date and when it expires. Our library will create these for you (except nbf),
with a default expiration of 1 hour. `nbf` is optional.Here is a simple example that shows you how to create a secure byte string for
your signing key, and then use that key to sign a JWT with some claims that you
provide:````javascript
var nJwt = require('njwt');
var secureRandom = require('secure-random');var signingKey = secureRandom(256, {type: 'Buffer'}); // Create a highly random byte array of 256 bytes
var claims = {
iss: "http://myapp.com/", // The URL of your service
sub: "users/user1234", // The UID of the user in your system
scope: "self, admins"
}var jwt = nJwt.create(claims,signingKey);
````
Once you have created the JWT, you can look at its internal structure by
logging it to the console. This is our internal representation of the token,
this is not what you'll send to your end user:````javascript
console.log(jwt);
````
````json
{
"header": {
"typ": "JWT",
"alg": "HS256"
},
"body": {
"jti": "c84280e6-0021-4e69-ad76-7a3fdd3d4ede",
"iat": 1434660338,
"exp": 1434663938,
"nbf": 1434663938,
"iss": "http://myapp.com/",
"sub": "users/user1234",
"scope": ["self","admins"]
}
}
````
Our library has added the `jti` field for you, this is a random ID that will be
unique for every token. You can use this if you want to create a database of
tokens that have been issued to the user.When you are ready to give the token to your end user, you need to compact it.
This will turn it into a Base64 URL encoded string, making it safe to pass
around in browsers without any unexpected formatting applied to it.````javascript
var token = jwt.compact();
console.log(token);
````
````
eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJmb28iOiJiYXIiLCJpYXQiOjE0MzQ0Nzk4ODN9.HQyx15jWm1upqsrKSf89X_iP0sg7N46a9pqBVGPMYdiqZeuU_ZZOdU-zizHJoIHMIJxtEWzpSMaVubJW0AJsTqjqQf6GoJ4cmFAfmfUFXmMC4Xv5oc4UqvGizpoLjfZedd834PcwbS-WskZcL4pVNmBIGRtDXkoU1j2X1P5M_sNJ9lYZ5vITyqe4MYJovQzNdQziUNhcMI5wkXncV7XzGInBeQsPquASWVG4gb3Y--k1P3xWA4Df3rKeEQBbInDKXczvDpfIlTojx4Ch8OM8vXWWNxW-mIQrV31wRrS9XtNoig7irx8N0MzokiYKrQ8WP_ezPicHvVPIHhz-InOw
````This is the JWT that the client application will retain, and use for authentication.
Your server application will also need to persist the signing key that was used
to sign the token, and when the client tries to use this token for
authentication, you will need to use the same signing key for verification.The Buffer needs to be converted to a string so that it can be persisted in a
database, and you can do so like this:```
var base64SigningKey = signingKey.toString('base64');
```If you are going to use multiple signing keys, it is common practice to create a
random ID which identifies the key, and store that ID with the key in your
database. When you create JWTs, set the `kid` field of the header to be this ID.
Then when verifying JWTs, this `kid` field will tell you which signing key should
be used for verification.### Verifying Signed JWTs
The end user will use their JWT to authenticate themselves with your service.
When they present the JWT, you want to check the token to ensure that it's valid.
This library does the following checks when you call the `verify` method:* It was created by you (by verifying the signature, using the secret signing key)
* It hasn't been modified (e.g. some claims were maliciously added)
* It hasn't expired
* It is activeTo verify a previously issued token, use the `verify` method. You must give it
the same signing key that you are using to create tokens:
````javascript
nJwt.verify(token,signingKey,function(err,verifiedJwt){
if(err){
console.log(err); // Token has expired, has been tampered with, etc
}else{
console.log(verifiedJwt); // Will contain the header and body
}
});
````If validation fails you can look at `err.message` to understand the problem. If
the header and body of the JWT were parse-able (not not verifiable) they will
be provided as objects at `err.parsedHeader` and `err.parsedBody`.You can also use verify synchronously, in which case the errors will be thrown:
````javascript
try{
verifiedJwt = nJwt.verify(token,signingKey);
}catch(e){
console.log(e);
}
````### Changing the algorithm
If you want to change the algorithm from the default `HS256`, you can do so
by passing it as a third argument to the `create` or `verify` methods:````javascript
var jwt = nJwt.create(claims,signingKey,'HS512');
````
````javascript
nJwt.verify(token,signingKey, 'HS512');
````See the table below for a list of supported algorithms. If using RSA key pairs,
the public key will be the signing key parameter.### Customizing the token
While we've chosen secure, sensible defaults for you, you may need to change it
up.#### Claims
If you need to provide custom claims, simply supply them to the `create` method
or add them manually to the claims body after the JWT is created. These two
examples create the same claims body:```javascript
var claims = {
scope: 'admins'
}var jwt = nJwt.create(claims,secret);
jwt.body.scope = 'admins';
jwt.setClaim('otherClaim', 'value');
````
#### Headers
You can manually modify headers object, or use the `setHeader()` method:
```javascript
var jwt = nJwt.create({}, keyMap.kid_a);jwt.headers.myClaim = 'foo';
jwt.setHeader('kid', 'kid_a');
```### Using a key resolver
If your application is using multiple signing keys, nJwt provides a handy little feature that allows you to resolve which signing key should be used to verify a token.To do this, you first need to manually create a verifier instance, using `nJwt.createVerifier()`, and then provide your key resolution function to the `withKeyResolver()` method:
```javascript
var keyMap = {
kid_a: '',
kid_b: ''
};function myKeyResolver(kid, cb) {
var key = keyMap[kid];if (key) {
return cb(null, key);
}cb(new Error('Unknown kid'));
}var tokenA = nJwt.create({}, keyMap.kid_a).setHeader('kid', 'kid_a').compact();
var tokenB = nJwt.create({}, 'foo').setHeader('kid', 'bar').compact();
var verifier = nJwt.createVerifier().withKeyResolver(myKeyResolver);
// synchronously
try {
// This will pass and print the result
var parsedJwt = verifier.verify(tokenA);
console.log(parsedJwt);} catch(e) {
console.log(e);
}// asynchronously
verifier.verify(tokenB, function(err, verifiedJwt) {
if (err) {
return console.log(err); // This error with "'Error while resolving signing key for kid "bar"'"
}console.log(verifiedJwt);
});
```#### Expiration Claim
A convenience method is supplied for modifying the `exp` claim. You can modify
the `exp` claim by passing a `Date` object, or a millisecond value, to the
`setExpiration` method:```javascript
var jwt = nJwt.create(claims,secret);jwt.setExpiration(new Date('2015-07-01')); // A specific date
jwt.setExpiration(new Date().getTime() + (60*60*1000)); // One hour from now
jwt.setExpiration(); // Remove the exp claim
```#### NotBefore Claim
A convenience method is supplied for modifying the `nbf` claim. You can modify
the `nbf` claim by passing a `Date` object, or a millisecond value, to the
`setNotBefore` method:```javascript
var jwt = nJwt.create(claims,secret);jwt.setNotBefore(new Date('2015-07-01')); // token is active from this date
jwt.setNotBefore(new Date().getTime() + (60*60*1000)); // One hour from now
jwt.setNotBefore(); // Remove the exp claim
```## Supported Algorithms
"alg" Value | Algorithm used
------------|----------------------------
HS256 | HMAC using SHA-256 hash algorithm
HS384 | HMAC using SHA-384 hash algorithm
HS512 | HMAC using SHA-512 hash algorithm
RS256 | RSASSA using SHA-256 hash algorithm
RS384 | RSASSA using SHA-384 hash algorithm
RS512 | RSASSA using SHA-512 hash algorithm
ES256 | ECDSA using P-256 curve and SHA-256 hash algorithm
ES384 | ECDSA using P-384 curve and SHA-384 hash algorithm
ES512 | ECDSA using P-521 curve and SHA-512 hash algorithm
none | No digital signature or MAC value included## Unsupported features
The following features are not yet supported by this library:
* Encrypting the JWT (aka JWE)
## TypeScript usage
This package includes TypeScript definitions for library interface. They can be used as follows:
```typescript
import { Jwt, create } from 'njwt';
import crypto = require('crypto');const signingKey: Buffer = crypto.randomBytes(256); // Create a highly random byte array of 256 bytes
const claims = {
iss: 'http://myapp.com/', // The URL of your service
};
const jwt: Jwt = create(claims, signingKey);
```