This AngularJS module will help you implement client-side and server-side (API) authentication. You can use it together with Auth0 to add username/password authentication, support for enterprise identity like Active Directory or SAML and also for social identities like Google, Facebook or Salesforce among others to your web, API and mobile native apps.
Auth0 is a cloud service that provides a turn-key solution for authentication, authorization and Single Sign On.
For this tutorial, you need to create a new account in Auth0 and setup a new application. We will then implement client side and server side auth.
-
There are two ways of implementing signin/singup. One is using our Login Widget, which is a complete Login UI ready to use and the other one is using the JavaScript SDK which is just a wrapper to our API so you can build your UI on top.
<!-- login widget --> <script src="//d19p4zemcycm7a.cloudfront.net/w2/auth0-widget-2.3.js" type="text/javascript"> </script>
- or -
<!-- auth0.js and build your own UI --> <script src="https://d19p4zemcycm7a.cloudfront.net/w2/auth0-1.2.8.min.js"></script>
-
Add the Auth0 Angular module:
<script src="https://raw.github.com/auth0/auth0-angular/master/auth0-angular.js" type="text/javascript"> </script>
-
Include the Auth0 module as a dependency of the app main module:
var app = angular.module('myApp', ['auth0']);
-
Inject and initiate the
auth
service in the app main config block with yourdomain
,clientID
andcallbackURL
(get them from Auth0 dashboard in the Application settings).myApp.config(function ($routeProvider, authProvider) { ... authProvider.init({ domain: 'yourdomain.auth0.com', clientID: 'YOUR_CLIENT_ID', callbackURL: 'http://localhost:1337/', callbackOnLocationHash: true }); });
4. You can configure three routes for the Authentication flow (or just one and show/hide the login UI, whatever you prefer):
* `/login`: The route that will allow the user to input their credentials.
* `/logout`: The route that the user will follow in order to close its session.
* `/`: A route where you are going to display some restricted content.
Add the following router configuration to the `.config` block.
```js
myApp.config(function ($routeProvider, authProvider) {
...
$routeProvider
.when('/', { templateUrl: 'views/root.html', controller: 'RootCtrl' })
.when('/logout', { templateUrl: 'views/logout.html', controller: 'LogoutCtrl' })
.when('/login', { templateUrl: 'views/login.html', controller: 'LoginCtrl' })
.otherwise({ redirectTo: '/login' });
});
```
> Note: We are currently using Angular's ngRoute but any other routing library can be used.
5. Inject the `auth` service in your controllers and call the `signin`/`signout` methods.
```js
myApp.controller('LoginCtrl', function ($scope, auth) {
auth.signin();
});
myApp.controller('LogoutCtrl', function ($scope, auth) {
auth0.signout();
});
More details about the parameters you can use for the Auth0 Login Widget and auth0.js.
- Use the
auth.profile
object to show user attributes in the view.
myApp.controller('RootCtrl', function ($scope, $location, $http, auth) {
...
$scope.user = auth.profile;
};
The template of that controller will be:
<div>
<br />
<span>Welcome {{user.name}}!</span>
</div>
Now that the user was authenticated on the client side, you want to make sure that every time an API is called, the user attributes are sent in a secure way. The auth
service that you used before also provides a token
which is a signed JSON Web Token. This token can be sent through an HTTP header and the backedn API can validaate it without any extra roundtrip (since the token has been signed with a secret that is shared between the API and Auth0).
- Add to you application the
authInterceptor
dependency (it's included in the same auth0-angular.js file).
var myApp = angular.module('myApp', [
'ngCookies', 'ngRoute', 'auth0', 'authInterceptor'
]);
- Use
$http
from your controller in order to make the request.
$http({method: 'GET', url: '/api/protected'})
.success(function (data, status, headers, config) {
// User authenticated, do something with the response
...
})
.error(function (data, status, headers, config) {
...
});
NOTE: behind the scenes, the
authInterceptor
will add the JSON Web Token to each request. Something like:config.headers.Authorization = 'Bearer '+ auth.idToken;
-
If the JSON Web Token (
JWT
) has expired or has been tampered, you can handle that case here:$rootScope.$on('auth:forbidden', function (event, response) { // handle the case where the JWT is not valid (401 status code) auth.signout(); $location.path('/login'); });
Note: the JWT expiration can be controlled from the Auth0 dashboard
On the backed you can use any JWT library to validate the token. Here are some:
If you have multiple routes and you want to control what routes are anonymous, what routes need authentication and even do some custom logic to decide whether or not the user can access a route, read below.
The simplest way would be handling it at the controller level.
myApp.controller('RootCtrl', function (auth, $scope, $location, $http) {
if (!auth.isAuthenticated) {
$location.path('/login');
return;
}
// user is authenticated
}
You could also do something at the routing level. Our module is not coupled with any particular implementation of Angular routing, so you can choose the default ngRoute
, the ui-router or some other custom module like Angular Routing.
This article explains such approach using the ui-router
angular.module("myApp")
.run(function ($rootScope, $state, auth) {
$rootScope.$on("$stateChangeStart", function(event, curr, prev){
if (curr.authenticate && !auth.isAuthenticated){
// User isn’t authenticated
$state.transitionTo("login");
event.preventDefault();
}
});
});
The
authenticate
attribute is a boolean that you add to your routing table specifying that the route needs authentication. Read more about this approach in the article.
There are two examples:
- widget: a simple angular app doing auth with social and username/password using the Login Widget.
- custom-login: same as the previous one but without using the widget, just a custom login form.
The server side is using node.js and you can run it with npm install && node app.js
. It is pre-configured with a demo account with Amazon, Facebook, Google and username/password credentials.
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
The MIT License (MIT)
Copyright (c) 2013 AUTH10 LLC
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.