JWT Validator
Now that we have all the pieces in place for JWT, we can now register the JWT validator as our validator of choice: JwtAuthValidator@cbsecurity
.
The validator will inspect the incoming requests for valid JWT authorization headers. It will verify their expiration, their required claims, and the user it represents. Once done, it goes in the same rule/annotation security flow that cbsecurity leverages.
Module Override
Each module can also override its validator via its configuration setting cbsecurity.validator
. So if the global validator is something other than JWT but your module REQUIRES JWT validation, then add it in your ModuleConfig.cfc
JWT Token Discovery
The JWT validator will discover the incoming JWT token from 3 sources:
authorization
header using the bearer token approachCustom header configured in your settings:
cbsecurity.customAuthHeader
Incoming
rc
variable with the same name ascbsecurity.customAuthHeader
Token Scopes & Permissions
If your rules have the permissions
element or your secure
annotations have context, then we will treat those as the scopes/permissions to check the user/token must have at validation.
Validator Process
The validator will have the following validation process:
Verify the JWT exists via the
authorization
header or custom headerx-auth-token
or incomingrc[ 'x-auth-token' ]
Verify we can decode it
Verify if it has not expired from the token itself
If you have enabled auto refresh tokens, check out the refresh tokens process.
Verify it has the required claims
If token storage is enabled, verify the token in the permanent storage
Verify the subject (
sub
) claim and try to retrieve the user it representsTry to authenticate the user for the request
Verify the subject has the right permissions or that the token has the right scopes attached to it.
If all is valid, then place the token in
prc.jwt_token
and the payload inprc.jwt_payload
If all is valid, then place the user object in
prc.oCurrentUser
or the variable of your choice via thecbsecurity.prcUserVariable
setting.Continue or block
That's it! You can create your rules and annotations just like you used to, but now the validator will ensure valid JWT tokens are passed for those requests.
Last updated