npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@ping-identity/p14c-js-sdk-auth

v1.0.0-pre.2

Published

# NOTE: **THIS REPOSITORY IS IN A TESTING MODE AND IS NOT READY FOR PRODUCTION !!!**

Downloads

246

Readme

PingOne SDK for JavaScript Authentication Module

NOTE:

THIS REPOSITORY IS IN A TESTING MODE AND IS NOT READY FOR PRODUCTION !!!

Content

  1. Installation
  2. API Reference
  3. Supported authentication flows
  4. Tokens

Installation

To install @ping-identity/p14c-js-sdk-auth you can run these commands in your project root folder:

# yarn
yarn add @ping-identity/p14c-js-sdk-auth

or

# npm
npm install --save @ping-identity/p14c-js-sdk-auth

If you are using the JS on a web page from the browser, you can copy p14c-js-sdk-auth.js contents to a publicly hosted directory, and include a reference to the p14c-js-sdk-auth.js file in a <script> tag.

However, if you're using a bundler like Webpack or Browserify, you can simply import the module using CommonJS.

Warning: If you're in an environment that doesn't support Promises,TextEncoders etc such as Internet Explorer, you need to install such polyfills/shims:

const PingOneAuthClient = require("@ping-identity/p14c-js-sdk-auth");

const config = {
  clientId: "someClientId",
  environmentId: "someEnvironmentId",
  redirectUri: "https://localhost/callback",
  // Configure token storage to use session instead of local storage
  storage: "sessionStorage"
};

const authClient = new PingOneAuthClient(config);

, where configuration parameters are:

  • clientId : Required. Your application's client UUID. You can also find this value at Application's Settings right under the Application name.

  • environmentId: Required. Your application's Environment ID. You can find this value at your Application's Settings under Configuration tab from the admin console( extract xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx string that specifies the environment 128-bit universally unique identifier (UUID) right from https://auth.pingone .com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/as/authorize AUTHORIZATION URL ). Or from the Settings main menu (ENVIRONMENT ID variable)

  • responseType : Optional. Determines whether an access token, an authorization code, or an ID token is returned by the authorization server. Possible values are: an array from different combination of ["token", "id_token", "code"]. If pkce=true then both the access and id token will be requested and responseType will be ignored. Default value is: ["token", "id_token"].

  • storage : Optional. Tokens storage type. Possible values are: localStorage, sessionStorage, cookieStorage, memoryStorage. Default value is: localStorage. Window localStorage - data is stored and saved across browser sessions without expiration time. Window sessionStorage - data gets cleared when the page session ends(when the page is closed). cookieStorage, memoryStorage

  • tokenRenew : Optional. Renew expired token either with refresh token (if useRefreshTokens=true) or using a hidden iframe. Default value is: true.

  • useRefreshTokens: Optional. Use refresh token to exchange for new access tokens instead of using a hidden iframe and /oauth/token endpoint call. Will be ignored if tokenRenew=false.

  • pkce: Optional. Use Authorization Code with Proof Key for Code Exchange (PKCE) flow for token retrieval. Default value is: true.

  • codeChallengeMethod: Optional. Transformation method that creates the code_challenge value. Possible values are: S256 or plain. Will be ignored if pkce=false. Default value is: plain if not specified. The error will be triggered if S256_REQUIRED PKCE enforcement option is specified by the application, but codeChallengeMethod=plain is set.

  • cookies: { secure: true, sameSite: 'none' } : Optional. Cookies storage configuration. SameSite attribute allows you to declare if your cookie should be restricted to a first-party or same-site context.

  • scopes : Optional. Array of standard OIDC or PingOne custom scopes you want to request authorization for. Default value is: ["openid"]

  • max_age: : Optional. Integer that specifies the maximum amount of time allowed since the user last authenticated. If the max_age value is exceeded, the user must re-authenticate.

  • acr_values : Optional. String that designates whether the authentication request includes specified sign-on policies. Sign-on policy names should be listed in order of preference, and they must be assigned to the application. For more information, see Sign-on policies

  • API_URI : Optional. PingOne API base endpoint. Default value is: https://api.pingone.com

  • AUTH_URI : Optional. PingOne Authentication base endpoint. Default value is:https://auth.pingone.com

Module API Reference

| Method | Description | | ------------- |------------- | | signIn() | Sign in the user | | signOut()| Sign out the user | | revokeToken(token, tokenName) | Revoke either access or refresh token (tokenName is accessToken and refreshToken respectively)| | parseRedirectUrl (options) | Parse window url to get all tokens either from implicit flow or authorization code with PKCE | | getUserInfo() | Get user information from OIDC userinfo endpoint |

Supported Authentication Flows

There are two supported grant options:

  • the Authorization Code Grant using Proof Key for Code Exchange (PKCE);
  • the Implicit Grant for Single Page application running in a browser.

For most cases, Authorization Code Grant with PKCE is recommend.

PKCE OAuth 2.0 flow

The PKCE OAuth flow is used by default. It requires some features browser to implement that are widely supported by most modern browsers when running on an HTTPS connection. So please make sure the features like specified below are supported by your browser:

Implicit OAuth 2.0 flow

Implicit OAuth flow is available as an option if PKCE flow cannot be supported in your deployment. It is widely supported by most browsers, and can work over an insecure HTTP connection. Note that implicit flow is less secure than PKCE flow, even over HTTPS, since raw tokens are exposed in the browser's history. For this reason, we highly recommend using the PKCE flow if possible. PingOne implicit flow follows the OAuth 2.0 spec that says that the authorization server must not issue a refresh token.

Implicit flow can be enabled by setting the pkce option to false

const authClient = new PingOneAuthClient({
     pkce: false
     // other config
});

Tokens

When and how to store tokens

  • If your SPA has a backend and can handle the API calls, then handle tokens server-side using authorization_code or authorization_code with Proof Key for Code Exchange (PKCE) flow.
  • If your SPA has a backend and cannot handle the API calls, then tokens should be stored in the SPA backend, but the SPA needs to fetch the tokens from the backend to perform requests to the API.
  • If your SPA doesn't have a backend server, then you should request new tokens on login and store them in memory without any persistence. To make API calls, your SPA would then use the in-memory copy of the token.

How tokens are renewed

Depending on your configuration, the SDK falls back either to the legacy technique of using a hidden iframe for token renewal, or just using a refresh token.

  • When tokenRenew and useRefreshTokens is set to true, refresh token will be used to exchange for new access tokens.
  • When tokenRenew is set to true and useRefreshTokens is set to false, the SDK will be using a hidden iframe with prompt=none to call the /oauth/token endpoint directly for a new access token and refresh token retrieval. This scenario occurs, for example, if you are using token in-memory cache and you have refreshed the page. In this case, refresh token stored previously will be lost.

What is refresh token and how it is used in SDK

Refresh tokens improve the authentication experience in a way that the user has to authenticate only once, and other subsequent re-authentication will take place without user interaction, using the Refresh Token. The authorization server can issue refresh tokens to web applications that use an authorization_code grant type.

To obtain a refresh token along with an access token, the application must be configured with the refresh_token and the authorization_code grant types. With this configuration, a refresh token is generated along with the access token. When obtaining the original access token, a refresh token is included in the response, which is tied to the client and the user session. As long as the session exists and it is not expired (30 days since the last sign on), the /{environmentId}/as/token endpoint can be used to exchange the refresh token for a new access token and refresh token. If the openid scope is granted, an ID token is also included.

When a new refresh token is issued, the previous refresh token is rotated to prevent token abuse, which is useful when client authentication is disabled. In addition, when a refresh token is exchanged, the activeAt property of the corresponding session is updated. This does not extend the duration of the session, but can be used to indicate that there is activity.

Only one refresh token is valid at any time for the environment, session and client.
If token is not recorded as the current refresh token (with sid and jti) for the environment, session and client, the error "Refresh token does not exist" is thrown.