Download the PHP package flownative/oauth2-client without Composer
On this page you can find all versions of the php package flownative/oauth2-client. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download flownative/oauth2-client
More information about flownative/oauth2-client
Files in flownative/oauth2-client
Package oauth2-client
Short Description A generic OAuth2 client base implementation for Flow Framework applications
License MIT
Informations about the package oauth2-client
OAuth 2.0 Client for Flow Framework
This Flow package provides an OAuth 2.0 client SDK. Even though it can be used as a generic OAuth2 client, it was developed as a backing library for the OpenID Connect package. That's why documentation for this package is a bit sparse at the moment and examples for generic use are missing.
At the time of writing (November 2020), this package is actively maintained and there are plans for improving functionality, test coverage and documentation.
Authorizations
This package stores states and tokens as "authorizations" in a dedicated database table.
For example, during the authorization code flow, this package needs to keep track of a "state" in order to make sense of an incoming "finish authorization" request. Another example is the client credentials flow, where an access token is stored in the authorizations table which is needed for executing authorized requests to the respective service.
Token lifetime
New Authorization tokens are created with a lifetime of 600 seconds
(10 minutes) by default.
The expiration date is updated during authentication if a different
expires
parameter is specified in the OAuth2 access token.
The default token lifetime and frequency of expired tokens to be removed automatically can be configured:
Note: By setting the defaultLifetime
to null
, new tokens won't expire
by default.
Authorization metadata
Authorizations also may contain developer-provided metadata. For example, you may attach an account identifier to an authorization when an authorization process starts and use that information when authorization finishes to make sure that the authorization is only used for a specific account (or customer number, or participant id).
To set metadata, you need to know the authorization id when starting the
authorization code flow. This code could be used in an overloaded
startAuthorizationAction()
:
And later, in finishAuthorization()
, you may retrieve the metadata as
follows:
Encryption
By default, access tokens are serialized and stored unencrypted in the "authorizations" database table. You can improve the security of your application by enabling the encrypted-at-rest feature of this package. when active, it will encrypt tokens before storing them in the database and decrypt them automatically when they are retrieved. The secret key which is needed for encryption and decryption is not stored in the database.
This package uses the "ChaCha20-Poly1305-IETF" construction for authenticated encryption / decryption of serialized tokens. It uses the "sodium" PHP extension if installed, or a polyfill implementation in pure PHP.
Generating a Secret Key
The OAuth2 Flow package provides a CLI command for generating encryption keys suitable for the currently supported encryption method:
The key is base64-encoded in order to simplify handling and being able to pass the key via Flow settings.
Enabling Encryption
Set the encryption key via Flow settings (for example in your global "Configuration/Settings.yaml"). Make sure to deploy this setting securely, for example by creating the Settings file during deployment or by using environment variables.
Verifying Encryption Configuration
When you have set the encryption key, test that everything is working as
expected. Run your application so that a new authorization is created.
Check the database table flownative_oauth2_client_authorization
: the
column serializedaccesstoken
should be empty and the column
encryptedserializedaccesstoken
should contain a long string similar to
his one:
There are three parts in this string, separated by two dollar signs:
- the construction used for encryption ("ChaCha20-Poly1305-IETF")
- the nonce used for this particular entry ("Mjdj4s9IFrPp6HFK")
- the encrypted data ("k9v3x…KQ==")
All versions of oauth2-client with dependencies
neos/flow Version ^6.0 || ^7.0 || ^8.0 || ^9.0
guzzlehttp/guzzle Version ^6.0 || ^7.0
league/oauth2-client Version ^2.0
ramsey/uuid Version ^3.0 || ^4.0
paragonie/sodium_compat Version ^1.10