@wristband/cloudflare-workers-auth
v0.1.0
Published
SDK for integrating with Wristband for applications that leverage Cloudflare Workers on the backend (serverless). Handles user authentication and token management.
Downloads
33
Readme
Wristband Multi-Tenant Authentication SDK for Clouflare Workers (Serverless)
This module facilitates seamless interaction with Wristband for user authentication within multi-tenant Cloudflare Workers applications (serverless). It follows OAuth 2.1 and OpenID standards. It supports both CommonJS and ES Modules and includes TypeScript declaration files.
Key functionalities encompass the following:
- Initiating a login request by redirecting to Wristband.
- Receiving callback requests from Wristband to complete a login request.
- Retrieving all necessary JWT tokens and userinfo to start an application session.
- Logging out a user from the application by revoking refresh tokens and redirecting to Wristband.
- Checking for expired access tokens and refreshing them automatically, if necessary.
You can learn more about how authentication works in Wristband in our documentation:
Installation
npm install @wristband/cloudflare-workers-auth
or
yarn add @wristband/cloudflare-workers-auth
Usage
1) Initialize the SDK
First, create an instance of WristbandAuth
in your app directory structure in any location of your choice (i.e. src/wristband-auth.js
). Then, you can export this instance and use it across your project. When creating an instance, you provide all necessary configurations for your application to correlate with how you've set it up in Wristband.
// ESModules
import { createWristbandAuth } from '@wristband/cloudflare-workers-auth';
// CommonJS
// const { createWristbandAuth } = require('@wristband/cloudflare-workers-auth');
const wristbandAuth = createWristbandAuth({
clientId: "ic6saso5hzdvbnof3bwgccejxy",
clientSecret: "30e9977124b13037d035be10d727806f",
loginStateSecret: '7ffdbecc-ab7d-4134-9307-2dfcc52f7475',
loginUrl: "https://{tenant_domain}.yourapp.io/auth/login",
redirectUri: "https://{tenant_domain}.yourapp.io/auth/callback",
rootDomain: "yourapp.io",
useCustomDomains: true,
useTenantSubdomains: true,
wristbandApplicationDomain: "auth.yourapp.io",
});
// ESModules
export default wristbandAuth;
// CommonJS
// module.exports = wristbandAuth;
2) Choose Your Session Storage
This Wristband authentication SDK is unopinionated about how you store and manage your application session data after the user has authenticated. We typically recommend cookie-based sessions due to it being lighter-weight and not requiring a backend session store like Redis or other technologies. We are big fans of Iron Session for this reason. Examples below show what it might look like when using such a library to manage your application's session data.
Wherever you initialize your application, add your session framework:
import express from 'express';
import { getIronSession } from 'iron-session';
// Initialize Express app
const app = express();
// Middleware to initialize Iron Session cookie-based sessions for the application (can be moved to its own file).
const ironSession = function (sessionOptions) {
return async function ironSessionMiddleware(req, res, next) {
req.session = await getIronSession(req, res, sessionOptions);
next();
};
};
// 30 minute cookie-based session
app.use(
ironSession({
cookieName: 'my-session-cookie-name',
password: '983hr8f9rbgu9bfi9ewbefd8ewhf89ew',
cookieOptions: {
httpOnly: true,
maxAge: 1800,
path: '/',
sameSite: true,
secure: true,
},
})
);
...
...
3) Add Auth Endpoints
There are three core API endpoints your Workers should expose to facilitate both the Login and Logout workflows in Wristband. You'll need to add them to wherever your routes/controllers are.
Login Endpoint
The goal of the Login Endpoint is to initiate an auth request by redircting to the Wristband Authorization Endpoint. It will store any state tied to the auth request in a Login State Cookie, which will later be used by the Callback Endpoint. The frontend of your application should redirect to this endpoint when users need to log in to your application.
import { wristbandAuth } from './wristband-auth.js';
// Login Endpoint - Route path can be whatever you prefer
app.get('/auth/login', async (req, res) => {
try {
await wristbandAuth.login(req, res, { /* Optional login configs */ });
} catch (error) {
// Handle error
console.error(error);
res.status(500).send('Internal Server Error');
}
});
Callback Endpoint
The goal of the Callback Endpoint is to receive incoming calls from Wristband after the user has authenticated and ensure that the Login State cookie contains all auth request state in order to complete the Login Workflow. From there, it will call the Wristband Token Endpoint to fetch necessary JWTs, call the Wristband Userinfo Endpoint to get the user's data, and create a session for the application containing the JWTs and user data.
import { wristbandAuth } from './wristband-auth.js';
// Callback Endpoint - Route path can be whatever you prefer
app.get('/auth/callback', async (req, res) => {
try {
const callbackData = await wristbandAuth.callback(req, res);
// If the SDK does not need to return a redirect response, then we can save any necessary fields for the user's app session into a session cookie.
if (callbackData) {
// Store a simple flag to indicate the user has successfully authenticated.
req.session.isAuthenticated = true;
req.session.accessToken = callbackData.accessToken;
// Convert the "expiresIn" seconds into a Unix timestamp in milliseconds at which the token expires.
req.session.expiresAt = Date.now() + callbackData.expiresIn * 1000;
req.session.refreshToken = callbackData.refreshToken;
req.session.userId = callbackData.userinfo.sub;
req.session.tenantId = callbackData.userinfo.tnt_id;
req.session.identityProviderName = callbackData.userinfo.idp_name;
req.session.tenantDomainName = callbackData.tenantDomainName;
await req.session.save();
// Send the user back to the application.
res.redirect(callbackData.returnUrl || `https://${callbackData.tenantDomainName}.yourapp.io/`);
}
} catch (error) {
// Handle error
console.error(error);
res.status(500).send('Internal Server Error');
}
});
Logout Endpoint
The goal of the Logout Endpoint is to destroy the application's session that was established during the Callback Endpoint execution. If refresh tokens were requested during the Login Workflow, then a call to the Wristband Revoke Token Endpoint will occur. It then will redirect to the Wristband Logout Endpoint in order to destroy the user's authentication session within the Wristband platform. From there, Wristband will send the user to the Tenant-Level Login Page (unless configured otherwise).
import { wristbandAuth } from './wristband-auth.js';
// Logout Endpoint - Route path can be whatever you prefer
app.get('/auth/logout', async (req, res) => {
const { refreshToken, tenantDomainName } = session;
// Always destroy your application's session.
res.clearCookie('my-session-cookie-name');
req.session.destroy();
try {
await wristbandAuth.logout(req, res, { tenantDomainName, refreshToken });
} catch (error) {
// Handle error
console.error(error);
res.status(500).send('Internal Server Error');
}
});
4) Guard Your Non-Auth APIs and Handle Token Refresh
[!NOTE] There may be applications that do not want to utilize access tokens and/or refresh tokens. If that applies to your application, then you can ignore using the
refreshTokenIfExpired()
functionality.
Create a middleware somewhere in your project to check that your session is still valid. It must check if the access token is expired and perform a token refresh if necessary. The Wristband SDK will make 3 attempts to refresh the token and return the latest JWTs to your server.
import { wristbandAuth } from './wristband-auth.js';
// Middleware that ensures there is an authenticated user session and JWTs are not expired.
const authMiddleware = async function (req, res, next) {
const { expiresAt, isAuthenticated, refreshToken } = req.session;
if (!isAuthenticated) {
return res.status(401).send();
}
try {
const tokenData = await wristbandAuth.refreshTokenIfExpired(refreshToken, expiresAt);
if (tokenData) {
req.session.accessToken = tokenData.accessToken;
// Convert the "expiresIn" seconds into a Unix timestamp in milliseconds at which the token expires.
req.session.expiresAt = Date.now() + tokenData.expiresIn * 1000;
req.session.refreshToken = tokenData.refreshToken;
}
// Save the session in order to "touch" it (even if there is no new token data).
await req.session.save();
return next();
} catch (error) {
console.error(`Failed to refresh token due to: ${error}`);
return res.status(401).send();
}
};
export default authMiddleware;
Now import your auth middleware and use it for any routes that must be protected with an authenticated session.
import { authMiddleWare } from './auth-middleware.js';
// All APIs that are called from an unauthenticated state.
app.get('/auth/login', () => { ... });
app.get('/auth/callback', () => { ... });
app.get('/auth/logout', () => { ... });
// Protect any routes that require an authenticated session.
app.use('/api', authMiddleware, apiRoutes);
5) Pass Your Access Token to Downstream APIs
[!NOTE] This is only applicable if you wish to call Wristband's APIs directly or protect your application's other downstream backend APIs.
If you intend to utilize Wristband APIs within your application or secure any backend APIs or downstream services using the access token provided by Wristband, you must include this token in the Authorization
HTTP request header.
Authorization: Bearer <access_token_value>
For example, if you were using Axios to make API calls to other services, you would pass the access token from your application session into the Authorization
header as follows:
// You could pull this function into a utils file and use it across your project.
const bearerToken = function(req) {
return { headers: { Authorization: `Bearer ${req.session.accessToken}` } };
};
// Pass your access token in the request to downstream APIs
app.post('/orders', async (req, res, next) => {
try {
// Fictional example + pseudocode
const newOrder = { ...req.body };
db.save(newOrder)
await axios.post('/email-receipt', newOrder, bearerToken(req));
return res.status(200).send();
} catch (error) {
// Handle error
console.error(error);
res.status(500).send('Internal Server Error');
}
});
Wristband Auth Configuration Options
The createWristbandAuth()
function is used to instatiate the Wristband SDK. It takes an AuthConfig
type as an argument.
function createWristbandAuth(authConfig: AuthConfig): WristbandAuth {}
| AuthConfig Field | Type | Required | Description |
| ---------- | ---- | -------- | ----------- |
| clientId | string | Yes | The client ID for the application. |
| clientSecret | string | Yes | The client secret for the application. |
| customApplicationLoginPageUrl | string | No | Custom Application-Level Login Page URL (Tenant Discovery) if you are building/self-hosting that portion of the UI. By default, the SDK will use your Wristband-hosted Application-Level Login pgae URL. The SDK will redirect to either the self-hosted or Wristband-hosted URL in certain cases where it cannot resolve a proper Tenant-Level Login URL. |
| dangerouslyDisableSecureCookies | boolean | No | USE WITH CAUTION: If set to true, the "Secure" attribute will not be included in any cookie settings. This should only be done when testing in local development (if necessary). |
| loginStateSecret | string | Yes | A secret -- 32 or more characters in length -- used for encryption and decryption of login state cookies. |
| loginUrl | string | Yes | The URL for initiating the login request. |
| redirectUri | string | Yes | The redirect URI for callback after authentication. |
| rootDomain | string | Depends | The root domain for your application. This value only needs to be specified if you use tenant subdomains in your login and redirect URLs. |
| scopes | string[] | No | The scopes required for authentication. Refer to the docs for currently supported scopes. The default value is [openid, offline_access, email]
. |
| useCustomDomains | boolean | No | Indicates whether custom domains are used for authentication. |
| useTenantSubdomains | boolean | No | Indicates whether tenant subdomains are used for authentication. |
| wristbandApplicationDomain | string | Yes | The vanity domain of the Wristband application. |
API
login(req: Request, res: Response, config?: LoginConfig): Promise<void>
await login(req, res);
Wristband requires that your application specify a Tenant-Level domain when redirecting to the Wristband Authorize Endpoint when initiating an auth request. When the frontend of your application redirects the user to your Workers' Login Endpoint, there are two ways to accomplish getting the tenantDomainName
information: passing a query parameter or using tenant subdomains.
The login()
function can also take optional configuration if your application needs custom behavior:
| LoginConfig Field | Type | Required | Description | | ----------------- | ---- | -------- | ----------- | | customState | JSON | No | Additional state to be saved in the Login State Cookie. Upon successful completion of an auth request/login attempt, your Callback Endpoint will return this custom state (unmodified) as part of the return type. | | defaultTenantDomain | string | No | An optional default tenant domain name to use for the login request in the event the tenant domain cannot be found in either the subdomain or query parameters (depending on your subdomain configuration). |
Tenant Domain Query Param
If your application does not wish to utilize subdomains for each tenant, you can pass the tenant_domain
query parameter to your Login Endpoint, and the SDK will be able to make the appropriate redirection to the Wristband Authorize Endpoint.
GET https://yourapp.io/auth/login?tenant_domain=customer01
Your AuthConfig would look like the following when creating an SDK instance without any subdomains:
const wristbandAuth = createWristbandAuth({
clientId: "ic6saso5hzdvbnof3bwgccejxy",
clientSecret: "30e9977124b13037d035be10d727806f",
loginStateSecret: '7ffdbecc-ab7d-4134-9307-2dfcc52f7475',
loginUrl: "https://yourapp.io/auth/login",
redirectUri: "https://yourapp.io/auth/callback",
wristbandApplicationDomain: "yourapp-yourcompany.us.wristband.dev",
});
Tenant Subdomains
If your application wishes to utilize tenant subdomains, then you do not need to pass a query param when redirecting to your Workers' Login Endpoint. The SDK will parse the tenant subdomain from the URL in order to make the redirection to the Wristband Authorize Endpoint. You will also need to tell the SDK what your application's root domain is in order for it to correctly parse the subdomain.
GET https://customer01.yourapp.io/auth/login
Your AuthConfig would look like the following when creating an SDK instance when using subdomains:
const wristbandAuth = createWristbandAuth({
clientId: "ic6saso5hzdvbnof3bwgccejxy",
clientSecret: "30e9977124b13037d035be10d727806f",
loginStateSecret: '7ffdbecc-ab7d-4134-9307-2dfcc52f7475',
loginUrl: "https://{tenant_domain}.yourapp.io/auth/login",
redirectUri: "https://{tenant_domain}.yourapp.io/auth/callback",
rootDomain: "yourapp.io",
useTenantSubdomains: true,
wristbandApplicationDomain: "yourapp-yourcompany.us.wristband.dev",
});
Default Tenant Domain
For certain use cases, it may be useful to specify a default tenant domain in the event that the login()
function cannot find a tenant domain in either the query parameters or in the URL subdomain. You can specify a fallback default tenant domain via a LoginConfig
object:
await wristbandAuth.login(req, res, { defaultTenantDomain: 'default' });
Custom State
Before your Login Endpoint redirects to Wristband, it will create a Login State Cookie to cache all necessary data required in the Callback Endpoint to complete any auth requests. You can inject additional state into that cookie via a LoginConfig
object:
await wristbandAuth.login(req, res, { customState: { test: 'abc' } });
[!WARNING] Injecting custom state is an advanced feature, and it is recommended to use
customState
sparingly. Most applications may not need it at all. The max cookie size is 4kB. From our own tests, passing acustomState
JSON of at most 1kB should be a safe ceiling.
Login Hints
Wristband will redirect to your Workers' Login Endpoint for workflows like Application-Level Login (Tenant Discovery) and can pass the login_hint
query parameter as part of the redirect request:
GET https://customer01.yourapp.io/auth/[email protected]
If Wristband passes this parameter, it will be appended as part of the redirect request to the Wristband Authorize Endpoint. Typically, the email form field on the Tenant-Level Login page is pre-filled when a user has previously entered their email on the Application-Level Login Page.
Return URLs
It is possible that users will try to access a location within your application that is not some default landing page. In those cases, they would expect to immediately land back at that desired location after logging in. This is a better experience for the user, especially in cases where they have application URLs bookmarked for convenience. Given that your frontend will redirect users to your Workers' Login Endpoint, you can pass a return_url
query parameter when redirecting to your Login Endpoint, and that URL will be available to you upon completion of the Callback Endpoint.
GET https://customer01.yourapp.io/auth/login?return_url=https://customer01.yourapp.io/settings/profile
The return URL is stored in the Login State Cookie, and you can choose to send users to that return URL (if necessary) after the SDK's callback()
funciton is done executing.
callback(req: Request, res: Response, config?: CallbackConfig): Promise<CallbackData | void>
const callbackData = await callback(req, res, config);
After a user authenticates on the Tenant-Level Login Page, Wristband will redirect to your Workers' Callback Endpoint with an authorization code which can be used to exchange for an access token. It will also pass the state parameter that was generated during the Login Endpoint.
GET https://customer01.yourapp.io/auth/callback?state=f983yr893hf89ewn0idjw8e9f&code=shcsh90jf9wc09j9w0jewc
The SDK will validate that the incoming state matches the Login State Cookie, and then it will call the Wristband Token Endpoint to exchange the authorizaiton code for JWTs. Lastly, it will call the Wristband Userinfo Endpoint to get any user data as specified by the scopes
in your SDK configuration. All of the token and user data gets returned so that your application can create an application session for the user and then redirect them back into your application. The CallbackData
is defined as follows:
| CallbackData Field | Type | Description |
| ------------------ | ---- | ----------- |
| accessToken | string | The access token that can be used for accessing Wristband APIs as well as protecting your application's backend APIs. |
| customState | JSON or undefined
| If you injected custom state into the Login State Cookie during the Login Endpoint for the current auth request, then that same custom state will be returned in this field. |
| expiresIn | number | The durtaion from the current time until the access token is expired (in seconds). |
| idToken | string | The ID token uniquely identifies the user that is authenticating and contains claim data about the user. |
| refreshToken | string or undefined
| The refresh token that renews expired access tokens with Wristband, maintaining continuous access to services. |
| returnUrl | string or undefined
| The URL to return to after authentication is completed. |
| tenantDomainName | string | The domain name of the tenant the user belongs to. |
| userinfo | JSON | Data for the current user retrieved from the Wristband Userinfo Endpoint. The data returned in this object follows the format laid out in the Wristband Userinfo Entity documentation. The exact fields that get returned are based on the scopes you configured in the SDK. |
| CallbackConfig Field | Type | Required | Description | | -------------------- | ---- | -------- | ----------- | | defaultTenantDomain | string | No | An optional default tenant domain name to use in the event a redirect to the login endpoint is required. This can happen when subdomains are not utilized and the tenant domain from the login state is not present (e.g login state cookie expired). |
Default Tenant Domain
For certain use cases, it may be useful to specify an optional default tenant domain name to use in the event a redirect to the login endpoint is required. This can happen when subdomains are not utilized and the tenant domain from the login state is not present (e.g login state cookie expired). You can specify a fallback default tenant domain via a CallbackConfig
object:
await wristbandAuth.callback(req, res, { defaultTenantDomain: 'default' });
Redirect Responses
There are certain scenarios where instead of callback data being returned by the SDK, a redirect response occurs during execution instead. The following are edge cases where this occurs:
- The Login State Cookie is missing by the time Wristband redirects back to the Callback Endpoint.
- The
state
query parameter sent from Wristband to your Callback Endpoint does not match the Login State Cookie. - Wristband sends an
error
query parameter to your Callback Endpoint, and it is an expected error type that the SDK knows how to resolve.
The location of where the user gets redirected to in these scenarios depends on if the application is using tenant subdomains and if the SDK is able to determine which tenant the user is currently attempting to log in to. The resolution happens in the following order:
- If the tenant domain can be determined, then the user will get redirected back to your Workers' Login Endpoint.
- If a tenant domain cannot be determined AND you specified a
customApplicationLoginPageUrl
when instantiating the SDK, then the user will be sent to the custom Application-Level Login Page URL. - Otherwise, the user will be sent to the Wristband-hosted Application-Level Login Page URL.
Error Parameters
Certain edge cases are possible where Wristband encounters an error during the processing of an auth request. These are the following query parameters that are sent for those cases to your Callback Endpoint:
| Query Parameter | Description | | --------------- | ----------- | | error | Indicates an error that occurred during the Login Workflow. | | error_description | A human-readable description or explanation of the error to help diagnose and resolve issues more effectively. |
GET https://customer01.yourapp.io/auth/callback?state=f983yr893hf89ewn0idjw8e9f&error=login_required&error_description=User%20must%20re-authenticate%20because%20the%20specified%20max_age%20value%20has%20elapsed
The error types that get automatically resolved in the SDK are:
| Error | Description | | ----- | ----------- | | login_required | Indicates that the user needs to log in to continue. This error can occur in scenarios where the user's session has expired, the user is not currently authenticated, or Wristband requires the user to explicitly log in again for security reasons. |
For all other error types, the SDK will throw a WristbandError
object (containing the error and description) that your application can catch and handle. Most errors come from SDK configuration issues during development that should be addressed before release to production.
logout(req: Request, res: Response, config?: LogoutConfig): Promise<void>
await logout(req, res, config: { refreshToken: '98yht308hf902hc90wh09' });
When users of your application are ready to log out and/or their application session expires, your frontend should redirect the user to your Workers' Logout Endpoint.
GET https://customer01.yourapp.io/auth/logout
If your application created a session, it should destroy it before invoking the logout()
function. This function can also take an optional LogoutConfig
argument:
| LogoutConfig Field | Type | Required | Description | | ----------------- | ---- | -------- | ----------- | | redirectUrl | string | No | Optional URL that Wristband will redirect to after the logout operation has completed. | | refreshToken | string | No | The refresh token to revoke. | | tenantDomainName | string | No | The domain name of the tenant the user belongs to. |
Revoking Refresh Tokens
If your application requested refresh tokens during the Login Workflow (via the offline_access
scope), it is crucial to revoke the user's access to that refresh token when logging out. Otherwise, the refresh token would still be valid and able to refresh new access tokens. You should pass the refresh token into the LogoutConfig when invoking the logout()
function, and the SDK will call to the Wristband Revoke Token Endpoint automatically.
Resolving Tenant Domains
Much like the Login Endpoint, Wristband requires your application specify a Tenant-Level domain when redirecting to the Wristband Logout Endpoint. If your application does not utilize tenant subdomains, then you will need to explicitly pass it into the LogoutConfig.
await logout(req, res, config: { refreshToken: '98yht308hf902hc90wh09', tenantDomain: 'customer01' });
If your application uses tenant subdomains, then passing the tenantDomain
field to the LogoutConfig is not required since the SDK will automatically parse the subdomain from the URL.
Custom Logout Redirect URL
Some applications might require the ability to land on a different page besides the Login Page after logging a user out. You can add the redirectUrl
field to the LogoutConfig, and doing so will tell Wristband to redirect to that location after it finishes processing the logout request.
const logoutConfig = {
redirectUrl: 'https://custom-logout.com',
refreshToken: '98yht308hf902hc90wh09',
tenantDomain: 'customer01'
};
await logout(req, res, logoutConfig);
refreshTokenIfExpired(refreshToken: string, expiresAt: number): Promise<TokenData | null>
const tokenData = await refreshTokenIfExpired('98yht308hf902hc90wh09', 1710707503788);
If your application is using access tokens generated by Wristband either to make API calls to Wristband or to protect other backend APIs, then your applicaiton needs to ensure that access tokens don't expire until the user's session ends. You can use the refresh token to generate new access tokens.
| Argument | Type | Required | Description | | -------- | ---- | -------- | ----------- | | expiresAt | number | Yes | Unix timestamp in milliseconds at which the token expires. | | refreshToken | string | Yes | The refresh token used to send to Wristband when access tokens expire in order to receive new tokens. |
If the refreshTokenIfExpired()
functions finds that your token has not expired yet, it will return null
as the value, which means your auth middleware can simply continue forward as usual.
Questions
Reach out to the Wristband team at [email protected] for any questions regarding this SDK.