@sridi/okta-react-redux-first-router
v1.4.5
Published
React support for Okta, with redux first router implementation
Downloads
4
Readme
Okta React Redux First Router SDK
Okta React Redux First Router SDK builds on top of the Okta Auth SDK. This SDK adds integration with redux-first-router and provides additional logic and components designed to help you quickly add authentication and authorization to your React single-page web application.
With the Okta Auth SDK, you can:
- Login and logout from Okta using the OAuth 2.0 API
- Retrieve user information
- Determine authentication status
- Validate the current user's session
All of these features are supported by this SDK. Additionally, using this SDK, you can:
- Add "secure" routes, which will require authentication before render
- Define custom logic/behavior when authentication is required
- Provide an instance of the Auth service to your components using a higher-order component
This SDK does not provide any UI components.
This library currently supports:
Getting Started
- If you do not already have a Developer Edition Account, you can create one at https://developer.okta.com/signup/.
- An Okta Application, configured for Single-Page App (SPA) mode. This is done from the Okta Developer Console and you can find instructions here. When following the wizard, use the default properties. They are are designed to work with our sample applications.
Helpful Links
- React Quickstart
- If you don't have a React app, or are new to React, please start with this guide. It will walk you through the creation of a React app, creating routes, and other application development essentials.
- Okta Sample Application
- A fully functional sample application built using this SDK.
- Okta Guide: Sign users into your single-page application
- Step-by-step guide to integrating an existing React application with Okta login.
Installation
This library is available through npm. To install it, simply add it to your project:
npm install --save @sridi/okta-react-redux-first-router
Usage
okta-react-redux-first-router
works directly with [react-router-redux-first-router][] and provides some additional components:
- Security - Allows you to supply your OpenID Connect client configuration. Provides an instance of the Auth service to child components.
- SecureRoute - A normal
Thunk
except authentication is needed to render the component. - ImplicitCallback - A simple component which handles the login callback.
Create Routes
Here is a minimal working example. This example defines 3 routes:
- / - Anyone can access the home page
- /protected - Protected is only visible to authenticated users
- /implicit/callback - This is where auth is handled for you after redirection
// src/App.js
import React, { Component } from 'react';
import { Security } from '@okta/okta-react';
import Router from './Router';
import Home from './Home';
import Protected from './Protected';
class App extends Component {
render() {
return (
<Security issuer='https://{yourOktaDomain}.com/oauth2/default'
clientId='{clientId}'
redirectUri={window.location.origin + '/implicit/callback'} >
<Router />
</Security>
);
}
}
export default App;
Show Login and Logout Buttons
In the relevant location in your application, you will want to provide Login
and Logout
buttons for the user. You can show/hide the correct button by using the auth.isAuthenticated()
method. For example:
// src/Home.js
import React, { Component } from 'react';
import { withAuth } from '@okta/okta-react';
export default withAuth(class Home extends Component {
constructor(props) {
super(props);
this.state = { authenticated: null };
this.checkAuthentication = this.checkAuthentication.bind(this);
this.login = this.login.bind(this);
this.logout = this.logout.bind(this);
}
async checkAuthentication() {
const authenticated = await this.props.auth.isAuthenticated();
if (authenticated !== this.state.authenticated) {
this.setState({ authenticated });
}
}
async login() {
this.props.auth.login('/');
}
async logout() {
this.props.auth.logout('/');
}
async componentDidMount() {
this.checkAuthentication();
}
async componentDidUpdate() {
this.checkAuthentication();
}
render() {
if (this.state.authenticated === null) return null;
return this.state.authenticated ?
<button onClick={this.logout}>Logout</button> :
<button onClick={this.login}>Login</button>;
}
});
Use the Access Token
When your users are authenticated, your React application has an access token that was issued by your Okta Authorization server. You can use this token to authenticate requests for resources on your server or API. As a hypothetical example, let's say you have an API that provides messages for a user. You could create a MessageList
component that gets the access token and uses it to make an authenticated request to your server.
Reference
Security
Security is the top-most component of okta-react. This is where most of the configuration is provided.
Configuration options
These options are used by Security
to configure the Auth service. The most commonly used options are shown here. See Configuration Reference for an extended set of supported options.
- issuer (required) - The OpenId Connect
issuer
- clientId (required) - The OpenId Connect
client_id
- redirectUri (required) - Where the callback handler is hosted
- postLogoutRedirectUri | Specify the url where the browser should be redirected after logout. This url must be added to the list of
Logout redirect URIs
on the application'sGeneral Settings
tab. - scope (deprecated in v1.2.3): Use
scopes
instead - scopes (optional) - Reserved for custom claims to be returned in the tokens. Default:
['openid', 'email', 'profile']
. For a list of scopes and claims, please see Scope-dependent claims for more information. - responseType (optional) - Desired token types. Default:
['id_token', 'token']
. For PKCE flow, this should be left undefined or set to['code']
. - pkce (optional) - If
true
, PKCE flow will be used - onAuthRequired (optional) - callback function. Called when authentication is required. If this is not supplied,
okta-react
redirects to Okta. This callback will receiveauth
andhistory
parameters. This is triggered when:- login is called
- A
SecureRoute
is accessed without authentication
- onSessionExpired (optional) - callback function. Called when the Okta SSO session has expired or was ended outside of the application. This SDK adds a default handler which will call login to initiate a login flow. Passing a function here will disable the default handler.
- isAuthenticated (optional) - callback function. By default,
auth.isAuthenticated()
will return true if bothgetIdToken()
andgetAccessToken()
return a value. Setting aisAuthenticated
function on the config will skip the default logic and call the supplied function instead. The function should return a Promise and resolve to either true or false. - tokenManager (optional): An object containing additional properties used to configure the internal token manager. See AuthJS TokenManager for more detailed information.
autoRenew
(optional): By default, the library will attempt to renew expired tokens. When an expired token is requested by the library, a renewal request is executed to update the token. If you wish to to disable auto renewal of tokens, set autoRenew to false.secure
: Iftrue
then only "secure" https cookies will be stored. This option will prevent cookies from being stored on an HTTP connection. This option is only relevant ifstorage
is set tocookie
, or if the client browser does not supportlocalStorage
orsessionStorage
, in which casecookie
storage will be used.storage
(optional): Specify the type of storage for tokens. The types are:
Alternate configuration using Auth
instance
When the auth
option is passed, all other configuration options passed to Security
will be ignored.
- auth (optional) - Provide an Auth service instance instead of the options above. This is the most direct way to use methods on the Auth service instance outside of your components and is helpful when integrating
okta-react
with external libraries that need access to the tokens.
Configure an instance of the Auth service and pass it to the Security
component.
SecureRoute
ensures that a route is only rendered if the user is authenticated. If the user is not authenticated, it calls onAuthRequired
if it exists, otherwise, it redirects to the Home page.
ImplicitCallback
ImplicitCallback
handles the callback after the redirect. By default, it parses the tokens from the uri, stores them, then redirects to /
. If a SecureRoute
caused the redirect, then the callback redirects to the secured route. For more advanced cases, this component can be copied to your own source tree and modified as needed.
withAuth
withAuth
is a higher-order component which injects an auth
prop into the component. This provides a way for components to make decisions based on auth state.
auth
auth
An object that provides methods for managing tokens and auth state. All of the methods return Promises.
auth.isAuthenticated()
Returns true
or false
, depending on whether the user has an active access or id token.
auth.getUser()
Returns the result of the OpenID Connect /userinfo
endpoint if an access token exists.
auth.getIdToken()
Retrieves the id token from storage if it exists.
auth.getAccessToken()
Retrieves the access token from storage if it exists.
auth.login(fromUri, additionalParams)
Calls onAuthRequired
or redirects to Okta if onAuthRequired
is undefined. This method accepts a fromUri
parameter to push the user to after successful authentication, and an optional additionalParams
object.
For more information on additionalParams
, see the auth.redirect
method below.
auth.logout(uri)
Terminates the user's session in Okta and clears all stored tokens. Accepts an optional uri
parameter to push the user to after logout.
auth.redirect(additionalParams)
Performs a full-page redirect to Okta with optional request parameters.
The additionalParams
are mapped to Okta's /authorize
request parameters. This will override any existing configuration. As an example, if you have an Okta sessionToken
, you can bypass the full-page redirect by passing in this token. This is recommended when using the Okta Sign-In Widget. Simply pass in a sessionToken
into the redirect
method as follows:
auth.redirect({
sessionToken: '{sampleSessionToken}'
});
Note: For information on obtaining a
sessionToken
using the Okta Sign-In Widget, please see therenderEl()
example.
auth.handleAuthentication()
Parses tokens from the url and stores them.
auth.setFromUri(uri, queryParams)
Store the current URL state before a redirect occurs.
auth.getFromUri()
Returns the stored URI and query parameters stored by setFromUri
Contributing
We welcome contributions to all of our open-source packages. Please see the contribution guide to understand how to structure a contribution.
auth.getTokenManager()
Returns the internal TokenManager.
Development
Installing dependencies for contributions
We use yarn for dependency management when developing this package:
yarn install
Commands
| Command | Description |
|--------------|------------------------------------|
| yarn install
| Install dependencies |
| yarn start
| Start the sample app using the SDK |
| yarn test
| Run unit and integration tests |
| yarn lint
| Run eslint linting tests |