npm init
. This will set up your package.json
file.
You can leave the default settings or change them as you see fit.
Our sample’s package.json
looks like the following:
expressJwtSecret
we can generate a secret provider that will provide the right signing key to express-jwt
based on the kid
in the header. For more information refer to the node-jwks-rsa GitHub repository.req.body
as something easier to interface with.For more information and several alternatives refer to the body-parser GitHub repository.server.js
file. Your code needs to:
node server
and make an HTTP POST request to localhost:8080/timesheets/upload
. You should see a JSON response with a message This is the POST /timesheets/upload endpoint
.
So now we have our endpoint but anyone can call it. Continue to the next paragraph to see how we can fix this.
jwt
function, provided by the express-jwt middleware, and the jwks-rsa
package to retrieve the public key from Auth0. The libraries do the following:
express-jwt
will decode the token and pass the request, the header and the payload to jwksRsa.expressJwtSecret
.jwks-rsa
will then download all signing keys from the JWKS endpoint and see if a one of the signing keys matches the kid
in the header of the JWT. If none of the signing keys match the incoming kid
, an error will be thrown. If we have a match, we will pass the right signing key to express-jwt
.express-jwt
will continue its own logic to validate the signature of the token, the expiration, audience
and the issuer
.localhost:8080/timesheets/upload
we should get the error message Missing or invalid token
(which is perfectly fine since we didn’t send an access token in our request).
In order to test the working scenario as well we need to:
Authorization
header to our request with the value Bearer ACCESS_TOKEN
(where ACCESS_TOKEN
is the value of the token we retrieved in the first step).scope
) to use our endpoint in order to upload a timesheet. In particular we want to ensure that the token has the correct scope, which is batch:upload
.
In order to do this we will make use of the express-jwt-authz
Node.js package, so go ahead and add that to your project:
jwtAuthz(...)
to your middleware to ensure that the JWT contains a particular scope in order to execute a particular endpoint. This is our sample implementation (some code is omitted for brevity):
403
. You can test this by removing this scope from your API.
That’s it! You are done!