This library will help you work with JWTs.
- Decode a JWT from your AngularJS app
- Check the expiration date of the JWT
- Automatically send the JWT in every request made to the server
- Use refresh tokens to always send a not expired JWT to the server
You have several options:
bower install angular-jwt
npm install angular-jwt
<script type="text/javascript" src="https://cdn.rawgit.com/auth0/angular-jwt/master/dist/angular-jwt.js"></script>
jwtHelper will take care of helping you decode the token and check its expiration date.
angular.module('app', ['angular-jwt'])
.controller('Controller', function Controller(jwtHelper) {
var expToken = 'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL3NhbXBsZXMuYXV0aDAuY29tLyIsInN1YiI6ImZhY2Vib29rfDEwMTU0Mjg3MDI3NTEwMzAyIiwiYXVkIjoiQlVJSlNXOXg2MHNJSEJ3OEtkOUVtQ2JqOGVESUZ4REMiLCJleHAiOjE0MTIyMzQ3MzAsImlhdCI6MTQxMjE5ODczMH0.7M5sAV50fF1-_h9qVbdSgqAnXVF7mz3I6RjS6JiH0H8';
var tokenPayload = jwtHelper.decodeToken(expToken);
})
angular.module('app', ['angular-jwt'])
.controller('Controller', function Controller(jwtHelper) {
var date = jwtHelper.getTokenExpirationDate(expToken);
})
angular.module('app', ['angular-jwt'])
.controller('Controller', function Controller(jwtHelper) {
var bool = jwtHelper.isTokenExpired(expToken);
})
You can see some more examples of how this works in the tests
JWT interceptor will take care of sending the JWT in every request.
angular.module('app', ['angular-jwt'])
.config(function Config($httpProvider, jwtInterceptorProvider) {
// Please note we're annotating the function so that the $injector works when the file is minified
jwtInterceptorProvider.tokenGetter = ['myService', function(myService) {
myService.doSomething();
return localStorage.getItem('id_token');
}];
$httpProvider.interceptors.push('jwtInterceptor');
})
.controller('Controller', function Controller($http) {
// If localStorage contains the id_token it will be sent in the request
// Authorization: Bearer [yourToken] will be sent
$http({
url: '/hola',
method: 'GET'
});
})
angular.module('app', ['angular-jwt'])
.config(function Config($httpProvider, jwtInterceptorProvider) {
// Please note we're annotating the function so that the $injector works when the file is minified
jwtInterceptorProvider.tokenGetter = ['myService', function(myService) {
myService.doSomething();
return localStorage.getItem('id_token');
}];
$httpProvider.interceptors.push('jwtInterceptor');
})
.controller('Controller', function Controller($http) {
// This request will NOT send the token as it has skipAuthentication
$http({
url: '/hola',
skipAuthorization: true
method: 'GET'
});
})
By default the interceptor will send the JWT for all HTTP requests. This includes any ng-include
directives or
templateUrls
defined in a state
in the stateProvider
. If you want to avoid sending the JWT for these requests you
should adapt your tokenGetter
method to fit your needs. For example:
angular.module('app', ['angular-jwt'])
.config(function Config($httpProvider, jwtInterceptorProvider) {
jwtInterceptorProvider.tokenGetter = ['config', function(config) {
// Skip authentication for any requests ending in .html
if (config.url.substr(config.url.length - 5) == '.html') {
return null;
}
return localStorage.getItem('id_token');
}];
$httpProvider.interceptors.push('jwtInterceptor');
})
angular.module('app', ['angular-jwt'])
.config(function Config($httpProvider, jwtInterceptorProvider) {
jwtInterceptorProvider.tokenGetter = function(config) {
if (config.url.indexOf('http://auth0.com') === 0) {
return localStorage.getItem('auth0.id_token');
} else {
return localStorage.getItem('id_token');
}
}
$httpProvider.interceptors.push('jwtInterceptor');
})
.controller('Controller', function Controller($http) {
// This request will send the auth0.id_token since URL matches
$http({
url: 'http://auth0.com/hola',
skipAuthorization: true
method: 'GET'
});
}
As sometimes we need to get first the id_token
in order to send it, we can return a promise in the tokenGetter
. Let's see for example how we'd use a refresh_token
angular.module('app', ['angular-jwt'])
.config(function Config($httpProvider, jwtInterceptorProvider) {
jwtInterceptorProvider.tokenGetter = function(jwtHelper, $http) {
var idToken = localStorage.getItem('id_token');
var refreshToken = localStorage.getItem('refresh_token');
if (jwtHelper.isTokenExpired(idToken)) {
// This is a promise of a JWT id_token
return $http({
url: '/delegation',
// This makes it so that this request doesn't send the JWT
skipAuthorization: true,
method: 'POST',
data: {
grant_type: 'refresh_token',
refresh_token: refreshToken
}
}).then(function(response) {
var id_token = response.data.id_token;
localStorage.setItem('id_token', id_token);
return id_token;
});
} else {
return idToken;
}
}
$httpProvider.interceptors.push('jwtInterceptor');
})
.controller('Controller', function Controller($http) {
// Authorization: Bearer [yourToken] will be sent.
// That token might be a new one which was got from the refresh token
$http({
url: '/hola',
method: 'GET'
});
})
You can see some more examples of how this works in the tests
When you're using the tokenGetter
function, it's then called with the injector. ngAnnotate
doesn't automatically detect that this function receives services as parameters, therefore you must either annotate this method for ngAnnotate
to know, or use it like follows:
jwtInterceptorProvider.tokenGetter = ['store', '$http', function(store, $http) {
...
}];
This library is used in auth0-angular
Just clone the repo, run npm install
, bower install
and then gulp
to work :).
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
This project is licensed under the MIT license. See the LICENSE file for more info.