Socket
Socket
Sign inDemoInstall

@articulate/authentic

Package Overview
Dependencies
39
Maintainers
87
Versions
16
Alerts
File Explorer

Advanced tools

Install Socket

Detect and block malicious and high-risk dependencies

Install

    @articulate/authentic

Proper validation of JWT's against JWK's


Version published
Maintainers
87
Created

Readme

Source

@articulate/authentic

@articulate/authentic Build Status Coverage Status

Proper validation of JWT's against JWK's.

Motivation

The process of validating JWT's against JWK's is quite involved, but at the end of the day, you probably have an auth server with a /.well-known/openid-configuration endpoint, and you just want to know if an incoming JWT is valid. End of story. You don't want to fumble with parsing the JWT, matching kid values, converting certs, or caching JWK's.

Now you don't need to. Initialize authentic with an issWhitelist, and you'll receive a function that accepts a JWT and validates it. The rest is handled for you.

Usage

authentic :: { k: v } -> String -> Promise Boom { k: v }

Initialize authentic with an options object containing an issWhitelist array listing the token.payload.iss values you will accept. For example:

ProviderSample issWhitelist
Auth0[ 'https://${tenant}.auth0.com/' ]
Okta[ 'https://${tenant}.oktapreview.com/oauth2/${appName}' ]

Note: The urls in the list need to be exact matches of the payload.iss values in your JWT's.

You'll receive a unary function which takes a JWT and returns a Promise that resolves with the parsed JWT payload if it is valid, or rejects with a 401 Boom error if it is invalid.

const authentic = require('@articulate/authentic')({
  issWhitelist: JSON.parse(process.env.ISS_WHITELIST)
})

const handler = req =>
  authentic(req.cookies.token)
    .then(/* the JWT has been validated */)

Options

authentic accepts a JSON object with the following options:

  • jwks Object: options to forward to node-jwks-rsa with the following defaults:
optiondefault
cachetrue
rateLimittrue
  • verify Object: options to forward to jwt.verify from jsonwebtoken
  • issWhitelist Array: list of trusted OIDC issuers
  • claimsInError Array: list of jwt payload claims to receive as the data propery of the error when verification fails. When a list is not provided a data property will not be added to the error.

FAQs

Last updated on 23 Jun 2023

Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc