npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

passport-keycloak-bearer

v2.4.1

Published

HTTP Bearer authentication strategy for Passport and Keycloak

Downloads

39,436

Readme

passport-keycloak-bearer

GitHub stars Build

HTTP Bearer authentication strategy for Passport and Keycloak.

This module lets you authenticate HTTP requests using bearer tokens with a Keycloak authority in your Node.js applications. Bearer tokens are typically used protect API endpoints, and are often issued using OAuth 2.0.

By plugging into Passport, bearer token support can be easily and unobtrusively integrated into any application or framework that supports Connect-style middleware, including Express.

Install

$ npm install passport-keycloak-bearer

Usage

KeycloakBearerStrategy uses Bearer Token protocol to protect web resource/api. It works in the following manner: User sends a request to the protected web api which contains an access_token in either the authorization header or body. Passport extracts and validates the access_token, and propagates the claims in access_token to the verify callback and let the framework finish the remaining authentication procedure.

On successful authentication, passport adds the user information to req.user and passes it to the next middleware, which is usually the business logic of the web resource/api. In case of error, passport sends back an unauthorized response.

Sample usage

      import KeycloakBearerStrategy from 'passport-keycloak-bearer'
      ...
      // new KeycloakBearerStrategy(options, verify)
      passport.use(new KeycloakBearerStrategy(({
          "realm": "master",
          "url": "https://keycloak.dev.com/auth"
      }, (jwtPayload, done) => {
          const user = doSomethingWithUser(jwtPayload);
          return done(null, user);
      }));

The JWT authentication strategy is constructed as follows:

new KeycloakBearerStrategy(options, verify)
Options
  • url (Required)

    Keycloak auth url. For instance: https://keycloak.dev.org/auth.

  • realm (Required)

    Your realm.

  • passReqToCallback (Optional - Default: false)

    Whether you want to use req as the first parameter in the verify callback. See section 5.1.1.3 for more details.

  • loggingLevel (Optional - Default: 'warn')

    Logging level. 'debug', 'info', 'warn' or 'error'.

  • customLogger (Optional)

    Custom logging instance. It must be able to log the following types: 'debug', 'info', 'warn' and 'error'.

  • issuer (Optional)

    If defined the token issuer (iss) will be verified against this value.

  • audience (Optional)

    If defined, the token audience (aud) will be verified against this value.

  • algorithms (Optional - Default: ['HS256'])

    List of strings with the names of the allowed algorithms. For instance, ["HS256", "HS384"].

  • ignoreExpiration (Optional)

    If true do not validate the expiration of the token.

  • jwtFromRequest (Optional)

    This value can be set according passport-jwt if this options is not used, passport-keycloak-bearer will obtain jwt from http header Auth as a Bearer token.

  • jsonWebTokenOptions (Optional)

    passport-keycloak-bearer is verifying the token using jsonwebtoken. Pass here an options object for any other option you can pass the jsonwebtoken verifier. (i.e maxAge)

Verify callback

verify is a function with the parameters verify(jwtPayload, done)

  • jwtPayload is an object literal containing the decoded JWT payload.
  • done is a passport error first callback accepting arguments done(error, user, info)

Authenticate Requests

Use passport.authenticate(), specifying the 'keycloak' strategy, to authenticate requests. Requests containing bearer verified do not require session support, so the session option can be set to false.

For example, as route middleware in an Express application:

app.get(
  '/path',
  passport.authenticate('keycloak', { session: false }),
  function(req, res) {
    res.json(req.user);
  }
);

Support

Submit an issue

Contribute

Contribute usage docs

License

MIT License

Simen Haugerud Granlund © 2018

Credits