passport-cloudfoundry-openidconnect
v0.1.2
Published
Cloud Foundry UAA OpenID-Connect authentication strategy for Passport.
Downloads
1
Readme
passport-cloudfoundry-openidconnect
Passport strategy for authenticating with Cloud Foundry open PaaS using OpenID-Connect.
##OpenID-Connect (From: http://openid.net/connect/) ####What is OpenID Connect ? OpenID Connect is a suite of lightweight specifications that provide a framework for identity interactions via REST like APIs. The simplest deployment of OpenID Connect allows for clients of all types including browser-based, mobile, and javascript clients, to request and receive information about identities and currently authenticated sessions. The specification suite is extensible, allowing participants to optionally also support encryption of identity data, discovery of the OpenID Provider, and advanced session management, including logout.
####How is OpenID Connect different than OpenID 2.0? OpenID Connect performs many of the same tasks as OpenID 2.0, but does so in a way that is API-friendly. OpenID Connect can also be extended to include more robust mechanisms for signing and encryption. Integration of OAuth 1.0a and OpenID 2.0 required an extension (called the OpenID/OAuth hybrid); in OpenID Connect, OAuth 2.0 capability is built into the protocol itself.
##OpenID-Connect (my definition) It's OAuth 2.0, but acts like an OpenID. i.e. App-developers implement it just like we would do for OAuth 2.0, but the consumer will see it work like an openID.
##OpenID-Connect (High-level steps):
Perform OAuth 2.0 as usual. And after authentication dance, your app will get an
access_token
, arefresh_token
just like in OAuth 2.0 but in addition an extra token calledtoken_id
.Then, we must take the
token_id
and decode it & validate couple of things mentioned here OpenID draft-spec draft 22 id.token.validationAfter the validation, we make a call to an endpoint to get user's profile
like: <openid-server>/userinfo
end point.
BTW, the access_token you get won't be able to do anything other than get user's profile (open id aspect).
(I think they should have named it "OAuth-ID" :) )
##CloudFoundry User Account and Authentication (UAA) Server
"The UAA is the identity management service for Cloud Foundry. It's primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well as various other management functions" - https://github.com/cloudfoundry/uaa
In essence, Cloud Foundry UAA provides mainly OAuth 2.0 but supports a slight-variation of OpenID-Connect and is easily extensible for other kinds of auth mechanisms.
####High-level steps for UAA OpenID:
Register your app to only have scope
openid
or during OAuth 2.0 dance, send{scope: 'oauth.2.0'}
.Perform OAuth 2.0 as usual. And after authentication dance, your app will get an
access_token
, arefresh_token
just like in OAuth 2.0 ~~but in addition an extra token calledtoken_id
~~.access_token
itself acts similar totoken_id
.Then, we must take the ~~token_id~~
access_token
and decode it & validate couple of things mentioned here OpenID draft-spec draft 22 id.token.validation.
access_token (Before):
abc.123.456
Decode: Take everything after first "." (= "123.456") and do Base64-decode.
acess_token (After)
{"exp":1357672585,"user_name":"[email protected]","scope":["openid"],"email":"[email protected]","aud":["openid"],"jti":"123-c545-4775-ad27-123","user_id":"123-2c45-111-8f37-123","client_id":"YOUR_APP_ID"}
Validate client_id is actually your app's id. Expiration (exp) is at a later date. ~~Issuer(iss) is UAA (not supported yet).~~
4.After the validation, we make a call to an endpoint to get user's profile like: <uaa-server>/userinfo
end point.
#####Notes:
- The access_token you get won't be able to do anything other than get user's profile (open id aspect).
- This passport-cloudfoundry-openidconnect already does all these things for you.
- Accurate as of Jan 8th 2012.
####CloudFoundry.com 's default endpoints####
- Authorize: https://uaa.cloudfoundry.com/oauth/authorize
- Token: https://uaa.cloudfoundry.com/oauth/token
- User Info: https://uaa.cloudfoundry.com/userinfo
####For more, please refer:####
UAA related blogs
- Introducing the UAA and Security for Cloud Foundry
- High Level Features of the UAA
- How to Integrate an Application with Cloud Foundry using OAuth2
UAA API details & Github
OpenID Connect
passport-cloudfoundry-openidconnect Installation
$ npm install passport-cloudfoundry-openidconnect
Usage
Configure Strategy
The CloudFoundry authentication strategy authenticates users using a CloudFoundry
account and OAuth 2.0 tokens. The strategy requires a verify
callback, which
accepts these credentials and calls done
providing a user, as well as
options
specifying a client ID, client secret, and callback URL.
var CloudFoundryStrategy = require('passport-cloudfoundry-openidconnect').Strategy;
var cfStrategy = new CloudFoundryStrategy({
clientID: CF_CLIENT_ID,
clientSecret: CF_CLIENT_SECRET,
callbackURL: CF_CALLBACK_URL
}, function(accessToken, refreshToken, profile, done) { //verify callback
// asynchronous verification, for effect...
process.nextTick(function() {
// To keep the example simple, the user's CloudFoundry profile is returned to
// represent the logged-in user. In a typical application, you would want
// to associate the CloudFoundry account with a user record in your database,
// and return that user instead.
return done(null, profile);
});
});
//****************************************
// Examples 2 (w/ 'state' parameter):
//****************************************
var CloudFoundryStrategy = require('passport-cloudfoundry-openidconnect').Strategy;
var cfStrategy = new CloudFoundryStrategy({
clientID: '123-456-789',
clientSecret: 'shhh-its-a-secret'
callbackURL: 'https://myapp.cloudfoundry.com/auth/cloudfoundry/callback',
passReqToCallback: true //<---- Pass this to get req (as 1st param)from CF.com to callback
},
function(req, accessToken, refreshToken, profile, done) {
//Verify things like 'state' in req.query (be sure to set: passReqToCallback=true)
if(req.query.state === 'stateValueIpreviouslySent') {
User.findOrCreate(..., function (err, user) {
done(err, user);
});
} else {
done({error: 'state value didnt match.. possible CSRF?'});
}
});
// Set a callback to generate 'state' value.
cfStrategy.setStateParamCallBack(generateState);
Where.. 'generateState' generates new state and stores is somwhere
and returns that random value back.
// Temporarily store `state` ids
var states = {};
// Generates a random value to be used as 'state' param during authorization
function generateStateParam() {
var state = uuid.v4();
states[state] = true;
return state;
}
// Finally, in your 'finalCallback',check if that state exists
if(req.query.state && states[req.query.state]) {
done(null, user);
//delete it from memory
delete states[req.query.state];
} else {
done({"error": 'state value didn't match. possible CSRF?'})
}
// Pass the strategy
passport.use(cfStrategy);
Express middlewares
In Express apps, you need to add the below middlewares. Also make sure to add them after Express' session middleware
// Initialize Passport! Also use passport.session() middleware, to support
// persistent login sessions (recommended).
app.use(passport.initialize());
app.use(passport.session());
Express routes
For passport to work, you need to add two routes.
app.get('/auth/cloudfoundry'…
to start OAuthapp.get('/auth/cloudfoundry/callback'…
to receive OAuth callback back from Cloud Foundry. * NOTE: This must match your callback url's path that you used to register the app.
For example, as route middleware in an Express application:
app.get('/auth/cloudfoundry',
passport.authenticate('cloudfoundry', {scope: 'openid'}),
function(req, res){
// The request will be redirected to CloudFoundry for authentication, so
// this function will not be called.
});
app.get('/auth/cloudfoundry/callback',
passport.authenticate('cloudfoundry', { failureRedirect: '/login' }),
function(req, res) {
// Successful authentication, redirect home.
res.redirect('/');
});
w/ 'state' parameter (& verify/match it in the main callback to ensure no CSRF)
app.get('/auth/cloudfoundry',
passport.authenticate('cloudfoundry', {state: 'generateSomeRandomStateString'}),
function(req, res){
// The request will be redirected to CloudFoundry for authentication, so
// this function will not be called.
});
Logging out
To logout, call req.logout()
AND cfStrategy.reset()
like below:
app.get('/', function(req, res) {
if(!req.user) {
req.session.destroy();
req.logout();
cfStrategy.reset(); //required!
return res.redirect('/login');
}
res.render('index', {
user: req.user
});
});
An Example OAuth2 App
The example app is located in the /examples folder. But here are the details.
Running the example app
- Git clone this repo to
passport-cloudfoundry-openidconnect
folder (notenpm install
won't download examples, docs etc). cd passport-cloudfoundry-openidconnect/examples/login
npm install
- Open
login/app.js
and setCF_CLIENT_ID
,CF_CLIENT_SECRET
&CF_CALLBACK_URL
- You will get these info when you register your app (see below).
//Set Cloud Foundry app's clientID
var CF_CLIENT_ID = '--insert-cloudfoundry-client-id-here--';
//Set Cloud Foundry app's clientSecret
var CF_CLIENT_SECRET = '--insert-cloudfoundry-client-secret-here--';
// Note: You should have a app.get(..) for this callback to receive callback from Cloud Foundry
// For example: If your callback url is: https://myKoolapp.cloudfoundry.com/auth/cloudfoundry/callback
// then, you should have a HTTP GET endpoint like: app.get('/auth/cloudfoundry/callback', callback))
//
var CF_CALLBACK_URL = '--insert-cloudfoundry--url--/auth/cloudfoundry/callback';
node app.js
to run app onlocalhost:3000
- PS: You should run this app at a pre-registered location that you provided during registering your app.
- Open up browser & open the app.
Registering your app
App Workflow
Once the app is up and running, here is how it works:
1. You will see login page like below (Click on 'Login with Cloud Foundry' link):
####2. Your browser will be redirected to https://uaa.cloudfoundry.com/login (default auth url): ####
####3. If you Sign-in using your cloudfoundry.com account, you will see ####
4. If you Approve, browser will redirect you to your app w/ access_token & user info. And you will see:
Tests
$ npm install --dev
$ make test
Credits
License
(MIT) VMware
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.