Simplified encrypted authentication tokens using JWE.
This package provides you with a simplified headerless and encrypted JWT. It provides you with sane defaults (AES128) and almost no configuration to counteract JWTs overblown standard. See this blog post for more information.
Example integration here in Sealas
- Add
authtoken
to your list of dependencies inmix.exs
:
def deps do
[
{:authtoken, "~> 0.3"}
]
end
- Configure
authtoken
. The minimum amount of configuration needed is a key for encryption.
config :authtoken,
token_key: <<1, 2, 3, 230, 103, 242, 149, 254, 4, 33, 137, 240, 23, 90, 99, 250>>
You can generate this with
iex> AuthToken.generate_key()
{:ok, <<1, 2, 3, 230, 103, 242, 149, 254, 4, 33, 137, 240, 23, 90, 99, 250>>}
Generate a token for your user after successful authentication like this:
token_content = %{userid: user.id}
{:ok, token} = AuthToken.generate_token(token_content)
then pass it on to your view.
The most likely use-case is going to be you wanting to decrypt a token you have received in the request headers.
{:ok, token} = AuthToken.decrypt_token(conn)
user_id = token.userid
By default a token should be refreshed every 30 minutes, using AuthToken.refresh_token/1
.
You can pass either a decrypted token, or simply the token you get from the client directly.
This will extend the lifetime of the token for another 30 minutes until it expires completely.
You can use this opportunity to check if the user's credentials haven't been revoked in the meantime.
case AuthToken.refresh_token(token) do
{:error, :timedout} ->
# Redirect to login
{:error, :stillfresh} ->
# Do nothing
{:ok, token} ->
# Check credentials and send back new token
end
For verification you can use the plug AuthToken.Plug.verify_token
.
import AuthToken.Plug
pipeline :auth do
plug :verify_token
end
scope "/protected/route", MyApp do
pipe_through :auth
resources "/", DoNastyStuffController
end
More detailed documentation can be found here: https://hexdocs.pm/authtoken.
More optional configuration options
Denotes the lifetime of a token in seconds. After it expires you need to generate a new one.
The total duration after which the token needs to be refreshd