Download the PHP package dragosgaftoneanu/okta-oidc-flows-php without Composer
On this page you can find all versions of the php package dragosgaftoneanu/okta-oidc-flows-php. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download dragosgaftoneanu/okta-oidc-flows-php
More information about dragosgaftoneanu/okta-oidc-flows-php
Files in dragosgaftoneanu/okta-oidc-flows-php
Package okta-oidc-flows-php
Short Description Library used to integrate Okta OIDC Flows inside PHP applications.
License MIT
Informations about the package okta-oidc-flows-php
Okta OIDC Flows PHP
This repository contains the source for the Okta OIDC PHP library that can be used to login your users using Authorization Code Flow, Authorization Code Flow with PKCE or Resource Owner Password Flow inside your PHP application.
:warning: Disclaimer: This is not an official product and does not qualify for Okta Support.
Installation
You can install this library by running the following command through Composer
Requirements
- An Okta account, called an organization (you can sign up for a free developer organization)
- A local web server that runs PHP 5.0+
- cURL library available for usage
Authorization Code Flow methods
setClientId($client_id)
This method sets the client ID used for authorization code flow.
setClientSecret($client_secret)
This method sets the client secret used for authorization code flow.
setRedirectUri($redirect_uri)
This method sets the redirect uri used for authorization code flow.
setIssuer($issuer)
This method sets the issuer used for authorization code flow.
setScopes($scopes)
This method sets the scopes used for authorization code flow.
setState($state)
This method sets the state used for authorization code flow.
setNonce($nonce)
This method sets the nonce used for authorization code flow.
parseAuthCode($code, $state, $error, $full=true)
This method takes the authorization code, state, error parameters from either GET
or POST
in order to further process the flow.
If $full
is set to true, then the result will contain also the details from /introspect and /userinfo endpoint, otherwise it will return only the JWT tokens received after exchanging the code.
Authorization Code Flow with PKCE methods
setClientId($client_id)
This method sets the client ID used for authorization code flow with PKCE.
setRedirectUri($redirect_uri)
This method sets the redirect uri used for authorization code flow with PKCE.
setIssuer($issuer)
This method sets the issuer used for authorization code flow with PKCE.
setScopes($scopes)
This method sets the scopes used for authorization code flow with PKCE.
setState($state)
This method sets the state used for authorization code flow with PKCE.
setNonce($nonce)
This method sets the nonce used for authorization code flow with PKCE.
setCodeVerifier($code_verifier)
This method sets the code verifier used for authorization code flow with PKCE.
parseAuthCode($code, $state, $error, $full=true)
This method takes the authorization code, state, error parameters from either GET
or POST
in order to further process the flow.
If $full
is set to true, then the result will contain also the details from /introspect and /userinfo endpoint, otherwise it will return only the JWT tokens received after exchanging the code.
Resource Owner PAssword Flow methods
setClientId($client_id)
This method sets the client ID used for resource owner password flow.
setClientSecret($client_secret)
This method sets the client secret used for resource owner password flow.
setIssuer($issuer)
This method sets the issuer used for resource owner password flow.
setScopes($scopes)
This method sets the scopes used for resource owner password flow.
setUsername($username)
This method sets the username used for resource owner password flow.
setPassword($password)
This method sets the password used for resource owner password flow.
getTokens($full=true)
This method sends the request to the /token endpoint and retrieves the JWT tokens.
If $full
is set to true, then the result will contain also the details from /introspect and /userinfo endpoint, otherwise it will return only the JWT tokens received after exchanging the code.
Bugs?
If you find a bug or encounter an issue when using the library, please open an issue on GitHub here and it will be further investigated.