This course is archived!
This tutorial uses a deprecated micro-framework called Silex. The fundamentals of REST are still ?valid, but the code we use can't be used in a real application.
Authorization via a Token
Keep on Learning!
If you liked what you've learned so far, dive in!
Subscribe to get
access to this tutorial plus video, code and script downloads.
Authorization via a TokenĀ¶
So we can deny access and turn that into a nice response. Cool. Now we need to create something thatāll look for a token on the request and authenticate us so we can actually create programmers!
You should know where to start: in one of our feature files. Weāre going to modify an existing scenario. See the Background of our programmer feature file? One of the things that we do before every single scenario is to make sure the weaverryan user exists in the database. We arenāt sending authentication headers, just guaranteeing that the user exists in the database:
# features/api/programmer.feature
# ...
Background:
Given the user "weaverryan" exists
# ... scenarios
Sending an Authorization Header on each RequestĀ¶
In the background, I already have a database table for tokens, and each token has a foreign-key relation to one user. So Iām going to extend the Background a little bit to create a token in that table that relates to weaverryan. And this is the important part, this says that on whatever request we make inside of our scenario, I want to send an Authorization header set to token, a space then ABCD123:
# features/api/programmer.feature
# ...
Background:
Given the user "weaverryan" exists
And "weaverryan" has an authentication token "ABCD123"
And I set the "Authorization" header to be "token ABCD123"
# ... scenarios
Why did I choose to set the Authorization header or this ātoken spaceā format? Technically, none of this is important. In a second, youāll see us grab and parse this header. If you use OAuth, it has directions on the type of names you should give these things. So Iām just using authorization header and the word token, space and the actual authentication token that weāre sending.
Hey You! Use HTTPS. No Excuses.Ā¶
By the way, we arenāt doing it in this tutorial, but one thing that thatās really important for authentication across your API is that you only do it over HTTPS. The easiest way to do this is to require HTTPS across your entire API. Otherwise, these authentication tokens are flying through the internet via plain text, and thatās a recipe for disaster.
If we rerun one of our tests right now, itās not going to make any difference. To prove it, letās rerun the first scenario of programmer.feature, which starts at line 11. So we say :11 and itās going to fail:
php vendor/bin/behat features/api/programmer.feature:11
It is setting that Authorization header, but we arenāt actually doing anything with it yet in our app. So weāre getting that 401 authentication required message.
Authenticating a User via a TokenĀ¶
So letās hook this up! Some of this is specific to Silexās security system, but in case youāre using something else, weāll stay high level enough to see what types of things you need to do in your system to make it happen. As always, if you have questions, just ask them in the comments!
Inside this Security/ directory here, Iāve already set up a bunch of things for an API token authentication system
1) ApiTokenListener: Gets the Token from the RequestĀ¶
The first thing weāre going to do is open this ApiTokenListener. Iāve written some fake code in here as you can see:
// src/KnpU/CodeBattle/Security/Authentication/ApiTokenListener.php
// ...
class ApiTokenListener implements ListenerInterface
{
// ...
public function handle(GetResponseEvent $event)
{
// ...
$request = $event->getRequest();
// there may not be authentication information on this request
if (!$request->headers->has('Authorization')) {
return;
}
// TODO - remove this return statement and add real code!
return;
// format should be "Authorization: token ABCDEFG"
$tokenString = 'HARDCODED';
if (!$tokenString) {
// there's no authentication info for us to process
return;
}
// some code that sends the tokenString into the Silex security system
// ...
}
// ...
}
The job of the listener is to look at the request object and get the token information off of it. And hey, since weāre sending the token on the Authorization header, we are going to look for it there. So letās get rid of this hard coded text and instead go get that Authorization header. You can say $request->headers->get('Authorization'). Thatās going to get you the actual raw token ABCD123 type of thing:
// src/KnpU/CodeBattle/Security/Authentication/ApiTokenListener.php
// ...
public function handle(GetResponseEvent $event)
{
// ...
$request = $event->getRequest();
$authorizationHeader = $request->headers->get('Authorization');
// ...
}
Next, since the actual token is the second part of that, we need to parse it out. Iāll say, $tokenString = $this->parseAuthorizationHeader(), which is a function Iāve already created down here. Itās a private function that expects a format of token space and gets the second part for you:
// src/KnpU/CodeBattle/Security/Authentication/ApiTokenListener.php
// ...
public function handle(GetResponseEvent $event)
{
// ...
$request = $event->getRequest();
$authorizationHeader = $request->headers->get('Authorization');
$tokenString = $this->parseAuthorizationHeader($authorizationHeader);
// ...
}
/**
* Takes in "token ABCDEFG" and returns "ABCDEFG"
*/
private function parseAuthorizationHeader($authorizationHeader)
{
// ...
}
Perfect!
At this point the $tokenString is ABCD123. So thatās all I want to talk about in this TokenListener, itās the only job of this class.
1) ApiTokenProvider: Uses the Token to find a UserĀ¶
Next, Iām going to open up the ApiTokenProvider. Its job is to take the token string ABCD123 and try to look up a valid User object in the database for it. First, remember how I have an api_token table in my database? Let me show you some of the behind-the-scenes magic:
// src/KnpU/CodeBattle/DataFixtures/FixturesManager.php
// this is an internal class that creates our database tables
$tokenTable = new Table('api_token');
$tokenTable->addColumn('id', 'integer'();
$tokenTable->addColumn('token', 'string', array('length' => 32));
$tokenTable->addColumn('userId', 'integer');
$tokenTable->addColumn('notes', 'string', array('length' => 255));
$tokenTable->addColumn('createdAt', 'datetime');
// ...
You can see here I am creating an api_token table. It has a token column which is the string and a user_id column which is the user it relates to. So you can imagine a big table full of tokens and each token is related to exactly one user. For example, if we look up the entry in the token table, we can figure out āyesā this is a valid token and it is a valid token for a user whose id is 5.
So here, the first thing weāll do is actually go and look up the token row. I donāt want to get into the details of exactly how this all hooks up because I want to focus on REST. But Iāve already configured this class and created some code behind the scenes to take in a token string, which is the ABCD123 thing in our case and return to me an ApiToken object, which represents a row in that table:
// src/KnpU/CodeBattle/Security/Authentication/ApiTokenProvider.php
// ...
class ApiTokenProvider implements AuthenticationProviderInterface
{
// ...
public function authenticate(TokenInterface $token)
{
// the actual token string value from the header - e.g. ABCDEFG
$tokenString = $token->getCredentials();
// find the ApiToken object in the database based on the TokenString
$apiToken = $this->apiTokenRepository->findOneByToken($tokenString);
if (!$apiToken) {
throw new BadCredentialsException('Invalid token');
}
// ... finishing code that's already written ...
}
// ...
}
So weāve taken the string and weāve queried for a row in the table. If we donāt have that row, we throw an exception which causes a 401 bad credentials error.
Next, when we have that, we just need to look up the User object from it. Remember, the job of this class is start with the token string and eventually give us a User object. And it does that by going through the api_token table:
// src/KnpU/CodeBattle/Security/Authentication/ApiTokenProvider.php
// ...
class ApiTokenProvider implements AuthenticationProviderInterface
{
// ...
public function authenticate(TokenInterface $token)
{
// the actual token string value from the header - e.g. ABCDEFG
$tokenString = $token->getCredentials();
// find the ApiToken object in the database based on the TokenString
$apiToken = $this->apiTokenRepository->findOneByToken($tokenString);
if (!$apiToken) {
throw new BadCredentialsException('Invalid token');
}
$user = $this->userRepository->find($apiToken->userId);
// ... finishing code that's already written ...
}
// ...
}
And thatās the job of this ApiTokenProvider class. Itās technical and at the core of Silexās security system, so I just want you to internalize what it does.
It Works! Get the Logged-In UserĀ¶
At this point - between these two classes and a few other things Iāve setup - if we send this Authorization header with a valid token, by the time we get it to our ProgrammerController, $this->getLoggedInUser() will actually return to us the User object thatās attached to the token that was sent:
// src/KnpU/CodeBattle/Controller/Api/ProgrammerController.php
// ...
public function newAction(Request $request)
{
// will return the User related to the token form the Authorization header!
if (!$this->isUserLoggedIn()) {
throw new AccessDeniedException();
}
// ...
}
In the case of our scenario, since weāre sending a token of ABCD123, it means that weāll get a User object that represents this weaverryan user. We will actually be logged in, except weāre logged in via the API token. So, letās try this out.
php vendor/bin/behat features/api/programmer.feature:11
And there it is!
The guts for getting this all working can be complicated, but the end result is so simple: send an Authorization header with the api token and use that to look in your database and figure out which User object if any this token is attached to.
So now, in handleRequest(), I have this ugly hard-coded logic that assumed that there is a user called weaverryan. Replace this garbage with $this->getLoggedInUser() to get the real user object thatās attached to our token:
// src/KnpU/CodeBattle/Controller/Api/ProgrammerController.php
// ...
private function handleRequest(Request $request, Programmer $programmer)
{
// ...
$programmer->userId = $this->getLoggedInUser()->id;
}
Hi. The authorization test doesn't appear to be working anymore. I'm still not getting the authorization headers in the behat tests even after adding the suggested rewrite rules. The listener is called but authorization is not in the headers. Any ideas?