A lean and configurable implementation of jwt auth for Express.js
MIT License
This package provides JSON Web Token Authentication support for
Express. It conveniently sets req.user
for authenticated requests. The authorization header is in the from of:
Authorization JWT < jwt token >
New to using JSON Web Tokens? Take a look at these resources:
npm install express-jwt-token
var express = require('express')
, auth = require('express-jwt-token')
, app = express()
, router = express.Router()
// Require jwt authorization on all routes
router.all('*', auth.jwtAuthProtected)
// Require jwt authorization on only api routes
router.all('/api/*', auth.jwtAuthProtected)
// Require jwt auth on a specific route
router.get('/auth-protected', auth.jwtAuthProtected, function(req, res){
res.send({'msg': 'Im jwt auth protected!'})
})
app.use('/', router)
app.listen(3000)
Now your route(s) are protected and require an authorization header in the form of:
Authorization JWT < jwt token >
Configure your JWT Secret. This must be changed for production. Default value is 'secret'
.
process.env.JWT_SECRET_KEY = 'Your Secret'
Configure the authorization header prefix. this is optional. Default is 'JWT'
.
process.env.jwtAuthHeaderPrefix
An Express.js middleware that ensures that a request has supplied an authorization header.
An Express.js middleware validates a JWT token.
An Express.js middleware that ensures that a request has supplied an authorization header.
The grouped middleware needed to enforce jwt Auth. Mounts the same as a single middleware.
When authorization fails express-jwt-token
will return an UnauthorizedError
with some helpful details about what went wrong.
This implementation was based on the excellent django-rest-framework-jwt library.