Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/kelvinmo/simplejwt
A simple JSON web token library written in PHP.
https://github.com/kelvinmo/simplejwt
jose jwe jws jwt php
Last synced: 9 days ago
JSON representation
A simple JSON web token library written in PHP.
- Host: GitHub
- URL: https://github.com/kelvinmo/simplejwt
- Owner: kelvinmo
- License: other
- Created: 2015-07-11T22:53:24.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2024-05-14T21:34:37.000Z (7 months ago)
- Last Synced: 2024-05-15T17:29:52.382Z (7 months ago)
- Topics: jose, jwe, jws, jwt, php
- Language: PHP
- Homepage:
- Size: 1.41 MB
- Stars: 62
- Watchers: 4
- Forks: 16
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE.txt
- Security: SECURITY.md
Awesome Lists containing this project
README
# SimpleJWT
SimpleJWT is a simple JSON web token library written in PHP.
[![Latest Stable Version](https://poser.pugx.org/kelvinmo/simplejwt/v/stable)](https://packagist.org/packages/kelvinmo/simplejwt)
[![CI](https://github.com/kelvinmo/simplejwt/workflows/CI/badge.svg)](https://github.com/kelvinmo/simplejwt/actions?query=workflow%3ACI)## Features
- JSON web token [RFC7519](http://tools.ietf.org/html/rfc7519),
JSON web signatures [RFC7515](http://tools.ietf.org/html/rfc7515)
and JSON web encryption [RFC7516](http://tools.ietf.org/html/rfc7516)
- JSON web keys [RFC7517](http://tools.ietf.org/html/rfc7517)
- COSE key objects [RFC9053](http://tools.ietf.org/html/rfc9053)
- Signature algorithms
* HMAC family (HS256, HS384, HS512)
* RSA family (RS256, RS384, RS512)
* ECDSA family (ES256, ES384, ES512)
* EdDSA
- Key management algorithms
* Key agreement or direct encryption
* RSAES-PKCS1-v1_5 (RSA1_5)
* RSAES with OAEP (RSA-OAEP, RSA-OAEP-256)
* AES key wrap (A128KW, A192KW, A256KW, A128GCMKW, A192GCMKW, A256GCMKW)
* PBES2 (PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW)
* Elliptic Curve Diffie-Hellman (ECDH-ES), including X25519
- Content encryption algorithms
* AES_CBC_HMAC_SHA2 family (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512)
* AES GCM family (A128GCM, A192GCM, A256GCM)## Requirements
- PHP 8.0 or later
- `gmp` extension
- `hash` extension
- `openssl` extension
- `sodium` extension for EdDSA and X25519 support## Installation
You can install via [Composer](http://getcomposer.org/).
```sh
composer require kelvinmo/simplejwt
```## Usage
### Key set
Keys used to sign or verify a JWT must firstly be added to a KeySet. You
can add keys in the following ways:1. By loading a JSON object formatted as a JWK Set object as per [RFC7517](http://tools.ietf.org/html/rfc7517):
```php
$set = new SimpleJWT\Keys\KeySet();
$set->load(file_get_contents('private.json'));
```2. By adding a key manually:
```php
$set = new SimpleJWT\Keys\KeySet();// JWK format
$key = new SimpleJWT\Keys\RSAKey(file_get_contents('jwk.json'), 'json');// PEM format - note raw key only, no X.509 certificates
$key = new SimpleJWT\Keys\RSAKey(file_get_contents('rsa.pem'), 'pem');$set->add($key);
```3. For a secret used in HMAC signatures, directly:
```php
$set = SimpleJWT\Keys\KeySet::createFromSecret('secret123');// The above is a shortcut for the following:
$set = new SimpleJWT\Keys\KeySet();
$key = new SimpleJWT\Keys\SymmetricKey('secret123', 'bin');
$set->add($key);
```### Creating a JWT
To create a JWT, set up the desired headers and claims as separate arrays, then
create a `JWT` object:```php
// Note $headers['alg'] is required
$headers = ['alg' => 'HS256', 'typ' => 'JWT'];
$claims = ['iss' => 'me', 'exp' => 1234567];
$jwt = new SimpleJWT\JWT($headers, $claims);
```The JWT can then be signed and encoded:
```php
try {
print $jwt->encode($set);
} catch (\RuntimeException $e) {}
```By default, SimpleJWT will automatically include a `kid` (Key ID) header and
a `iat` (Issued At) claim in all JWTs. If the key used to sign the JWT does
not have a `kid` assigned (e.g. if it is imported from a PEM file), a `kid`
is generated. You can disable this behaviour by specifying `$auto_complete`
to false when calling `SimpleJWT\JWT::encode()`.### Verifying a JWT
To consume and verify a JWT, use the decode function. Note that you will need
to supply the expected `alg` parameter that has been previously agreed out-of-band.```php
try {
$jwt = SimpleJWT\JWT::decode('abc.def.ghigjghr', $set, 'HS256');
} catch (SimpleJWT\InvalidTokenException $e) {}
print $jwt->getHeader('alg');
print $jwt->getClaim('sub');
```### Deserialising a JWT
You can also deserialise a JWT without verifying it using the deserialise function.
**Note that you should not trust the contents of the data contained in a JWT without verifying them.**```php
try {
$result = SimpleJWT\JWT::deserialise('abc.def.ghigjghr');
} catch (SimpleJWT\InvalidTokenException $e) {}
print $result['claims']['sub'];
print $result['signatures'][0]['headers']['alg'];
print $result['signatures'][0]['signing_input']; // abc.def
print $result['signatures'][0]['signature']; // ghigjghr
// Additional indices under $result['signatures'] if the JWT has more than
// one signature
```### Creating a JWE
To create a JWE, set up the desired header array and plaintext, then
create a `JWE` object:```php
// Note $headers['alg'] and $headers['enc'] are required
$headers = ['alg' => 'PBES2-HS256+A128KW', 'enc' => 'A128CBC-HS256'];
$plaintext = 'This is the plaintext I want to encrypt.';
$jwt = new SimpleJWT\JWE($headers, $plaintext);
```The JWE can then be encrypted:
```php
try {
print $jwt->encrypt($set);
} catch (\RuntimeException $e) {}
```### Decrypting a JWE
To decrypt a JWE, use the decrypt function:
```php
try {
$jwt = SimpleJWT\JWE::decrypt('abc.def.ghi.klm.nop', $set, 'PBES2-HS256+A128KW');
} catch (SimpleJWT\InvalidTokenException $e) {}
print $jwt->getHeader('alg');
print $jwt->getPlaintext();
```## Licence
BSD 3 clause