Skip to content

authlete/gin-oauth-server

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Authorization Server Implementation in Go

Overview

This is an authorization server implementation in Go which supports OAuth 2.0 and OpenID Connect.

This implementation is written using Gin API and authlete-go-gin library. Gin is a web framework written in Go. On the other hand, authlete-go-gin is an Authlete's open source library which provides utility components for developers to implement an authorization server and a resource server. authlete-go-gin in turn uses authlete-go library which is another open source library to communicate with Authlete Web APIs.

Access tokens issued by this authorization server can be used at a resource server which uses Authlete as a backend service. gin-resource-server is such a resource server implementation. It supports a userinfo endpoint defined in OpenID Connect Core 1.0 and includes an example implementation of a protected resource endpoint, too.

License

Apache License, Version 2.0

Source Code

https://github.com/authlete/gin-oauth-server

About Authlete

Authlete is a cloud service that provides an implementation of OAuth 2.0 & OpenID Connect (overview). You can easily get the functionalities of OAuth 2.0 and OpenID Connect either by using the default implementation provided by Authlete or by implementing your own authorization server using Authlete Web APIs as this implementation (gin-oauth-server) does.

To use this authorization server implementation, you need to get API credentials from Authlete and set them in authlete.toml. The steps to get API credentials are very easy. All you have to do is just to register your account (sign up). See Getting Started for details.

How To Run

  1. Install authlete-go and authlete-go-gin libraries.

     $ go get github.com/authlete/authlete-go
     $ go get github.com/authlete/authlete-go-gin
    
  2. Download the source code of this authorization server implementation.

     $ git clone https://github.com/authlete/gin-oauth-server.git
     $ cd gin-oauth-server
    
  3. Edit the configuration file to set the API credentials of yours.

     $ vi authlete.toml
    
  4. Build the authorization server.

     $ make
    
  5. Start the authorization server on http://localhost:8080.

     $ make run
    

Endpoints

This implementation exposes endpoints as listed in the table below.

Endpoint Path
Authorization Endpoint /api/authorization
Token Endpoint /api/token
JWK Set Endpoint /api/jwks
Configuration Endpoint /.well-known/openid-configuration
Revocation Endpoint /api/revocation
Introspection Endpoint /api/introspection

The authorization endpoint and the token endpoint accept parameters described in RFC 6749, OpenID Connect Core 1.0, OAuth 2.0 Multiple Response Type Encoding Practices, RFC 7636 (PKCE) and other specifications.

The JWK Set endpoint exposes a JSON Web Key Set document (JWK Set) so that client applications can (1) verify signatures signed by this OpenID Provider and (2) encrypt their requests to this OpenID Provider.

The configuration endpoint exposes the configuration information of this OpenID Provider in the JSON format defined in OpenID Connect Discovery 1.0.

The revocation endpoint is a Web API to revoke access tokens and refresh tokens. Its behavior is defined in RFC 7009.

The introspection endpoint is a Web API to get information about access tokens and refresh tokens. Its behavior is defined in RFC 7662.

Authorization Request Example

The following is an example to get an access token from the authorization endpoint using Implicit Flow. Don't forget to replace {client-id} in the URL with the real client ID of one of your client applications. As for client applications, see Getting Started and the document of Developer Console.

http://localhost:8080/api/authorization?client_id={client-id}&response_type=token

The request above will show you an authorization page. The page asks you to input login credentials and click "Authorize" button or "Deny" button. The dummy implementation of user database (user_management.go) contains the following two accounts. Use either of them.

Login ID Password
john john
jane jane

Note

  • CSRF protection is not implemented.

See Also

Contact

Contact Form : https://www.authlete.com/contact/

Purpose Email Address
General [email protected]
Sales [email protected]
PR [email protected]
Technical [email protected]