Download the PHP package rootinc/laravel-azure-middleware without Composer
On this page you can find all versions of the php package rootinc/laravel-azure-middleware. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Informations about the package laravel-azure-middleware
Laravel Azure Middleware
Provides Azure Authentication Middleware for a Laravel App. If you like this, checkout Laravel Saml Middleware
Normal Installation
composer require rootinc/laravel-azure-middleware
- run
php artisan vendor:publish --provider="RootInc\LaravelAzureMiddleware\AzureServiceProvider"
to install config file toconfig/azure.php
- In our routes folder (most likely
web.php
), add
NOTE: Only need the route names if configuring
redirect_uri
in the portal.
- In our
App\Http\Kernel.php
add'azure' => \RootInc\LaravelAzureMiddleware\Azure::class,
most likely to the$routeMiddleware
array.- In our
.env
addAZURE_TENANT_ID, AZURE_CLIENT_ID, AZURE_CLIENT_SECRET and AZURE_RESOURCE
. We can get these values/read more here: https://portal.azure.com/ (Hint: AZURE_RESOURCE should be https://graph.microsoft.com)- As of 0.8.0, we added
AZURE_SCOPE
, which are permissions to be used for the request. We can read more about these here: https://docs.microsoft.com/en-us/graph/api/resources/users?view=graph-rest-1.0- We also added an optional
AZURE_DOMAIN_HINT
that can be used to help users know which email address they should login with. More info here: https://azure.microsoft.com/en-us/updates/app-service-auth-and-azure-ad-domain-hints/- Within our app on https://portal.azure.com/ point
reply url
to the/login/azurecallback
route with the full url (ex: http://thewebsite.com/login/azurecallback).- Add the
azure
middleware to your route groups on any routes that needs protected by auth and enjoy :tada:- If you need custom callbacks, see Extended Installation.
NOTE:
You may need to add premissions for (legacy) Azure Active Directory GraphAs of 0.8.0, we are using v2 of Azure's login API, which allows us to pass scopes, or permissions we'd like to use.
Routing
Route::get('/login/azure', '\RootInc\LaravelAzureMiddleware\Azure@azure')->name('azure.login');
First parameter can be wherever you want to route the azure login. Change as you would like.
Route::get('/login/azurecallback', '\RootInc\LaravelAzureMiddleware\Azure@azurecallback')->name('azure.callback');
First parameter can be whatever you want to route after your callback. Change as you would like.
Route::get('/logout/azure', '\RootInc\LaravelAzureMiddleware\Azure@azurelogout')->name('azure.logout);
First parameter can be whatever you want to route after your callback. Change as you would like.
NOTE: Only need the route names if configuring
redirect_uri
in the portal.
Front End
It's best to have an Office 365 button on your login webpage that routes to route('azure.login')
. This can be as simple as an anchor tag like this <a href="{{ route('azure.login') }}" class="officeButton"></a>
Extended Installation
The out-of-the-box implementation let's you login users. However, let's say we would like to store this user into a database, as well as login the user in with Laravel Auth. There are two callbacks that are recommended to extend from the Azure class called success
and fail
. The following provides information on how to extend the Root Laravel Azure Middleware Library:
- To get started (assuming we've followed the Normal Installation directions), create a file called
AppAzure.php
in theApp\Http\Middleware
folder. You can either do this throughartisan
or manually. - Add this as a starting point in this file:
The above gives us a way to add/update users after a successful handshake. $profile
contains all sorts of metadata that we use to create or update our user. More information here: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-protocols-oauth-code#jwt-token-claims . The default implementation redirects to the intended url, or /
, so we call the parent here. Feel free to not extend the default and to redirect elsewhere.
-
Our routes need to be updated to the following:
- Finally, update
Kernel.php
'sazure
key to be'azure' => \App\Http\Middleware\AppAzure::class,
Other Extending Options
Callback on Every Handshake
As of v0.4.0, we added a callback after every successful request (handshake) from Azure. The default is to simply call the $next
closure. However, let's say we want to update the user. Here's an example of how to go about that:
Building off of our previous example from Extended Installation, we have a user in the Auth now (since we did Auth::login
in the success callback). With the user model, we can update the user's updated_at
field. The callback should call the closure, $next($request);
and return it. In our case, the default implementation does this, so we call the parent here.
Custom Redirect
As of v0.6.0, we added the ability to customize the redirect method. For example, if the session token's expire, but the user is still authenticated with Laravel, we can check for that with this example:
Different Login Route
As of v0.4.0, we added the ability to change the $login_route
in the middleware. Building off Extended Installation, in our AppAzure
class, we can simply set $login_route
to whatever. For example:
The above would now set $login_route
to /
or root.
Getting / Overriding the Azure Route
As of v0.7.0, we added the ability to get the Azure URL. For example, let's say we wanted to modify the Azure URL so that it also passed the user's email to Azure as a parmater. Building off Extended Installation, in our AppAzure
class, we could do something like this:
Using in a Multi-Tenanted Application
If the desired use case requires a multi-tenanted application you can simply provide common
in the .env file instead of a Tenant ID. eg. AZURE_TENANT_ID=common
.
This works by sending your end users to the generic login routes provided by Microsoft and for all intents and purposes shouldn't appear any different for development either. It should be known that there some inherent drawbacks to this approach as mentioned by in the MS Dev docs here:
When a single tenant application validates a token, it checks the signature of the token against the signing keys from the metadata document. This test allows it to make sure the issuer value in the token matches the one that was found in the metadata document. Because the /common endpoint doesn’t correspond to a tenant and isn’t an issuer, when you examine the issuer value in the metadata for /common it has a templated URL instead of an actual value...
Additional information regarding this can be found here.
Testing with Laravel Azure Middleware
As of v0.7.0, we added integration with Laravel's tests by calling actingAs
for HTTP tests or loginAs
with Dusk. This assumes that we are using the Auth::login
method in the success callback, shown at Extended Installation. There is no need to do anything in our AppAzure
class, unless we needed to overwrite the default behavior, which is shown below:
The above will call the class's redirect method, if it can't find a user in Laravel's auth. Otherwise, the above will call the class's handlecallback method. Therefore, tests can check if the correct redirection is happening, or that handlecallback is working correctly (which by default calls $next($request);
).
Contributing
Thank you for considering contributing to the Laravel Azure Middleware! To encourage active collaboration, we encourage pull requests, not just issues.
If you file an issue, the issue should contain a title and a clear description of the issue. You should also include as much relevant information as possible and a code sample that demonstrates the issue. The goal of a issue is to make it easy for yourself - and others - to replicate the bug and develop a fix.
License
The Laravel Azure Middleware is open-sourced software licensed under the MIT license.
All versions of laravel-azure-middleware with dependencies
laravel/framework Version >=5.4.0
guzzlehttp/guzzle Version >=6.2
microsoft/microsoft-graph Version ^1.5