Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(DataFlex) Verify Okta ID Token LocallyThis example demonstrates how to validate an Okta ID token using Chilkat's JWT class. For more information, see https://developer.okta.com/docs/guides/validate-id-tokens/overview/
Use ChilkatAx-win32.pkg Procedure Test Handle hoJsonToken Boolean iSuccess Handle hoJsonWebKeys Handle hoJwt String sIdToken String sJoseHeader Handle hoJson String sKid Variant vSbKid Handle hoSbKid String e String n Integer i Integer iCount_i Boolean iBFound Integer iIMatch Variant vPubkey Handle hoPubkey Variant vJsonWebKey Handle hoJsonWebKey Boolean iBVerified String sClaims Handle hoJsonClaims Handle hoDtExp Boolean iBExpired String sTemp1 Integer iTemp1 Boolean bTemp1 // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // This example begins with two JSON files: // // 1. The access + id token obtained from Okta as shown in one fo these examples: // Get Okta Token using Resource Owner Password Flow // // 2. The Okta web keys obtained by this example: Get Okta Web Keys // // // ---------------------------------------------------------------- // Note: The very last step of this example is where the claims, such as iss, aud, iat, exp, and nonce // are extracted from the ID token and examined. // ---------------------------------------------------------------- // Load the access/id token to be verified. // It contains JSON that looks like this: // { // "access_token": "eyJraWQiOiJhb ... O_eVu-kBp6g", // "token_type": "Bearer", // "expires_in": 3600, // "scope": "openid", // "id_token": "eyJraWQi ... FrL9WOuwbQtUg" // } // This example verifies the id_token. (The access_token is verified in this example: Verify Okta Access Token Get Create (RefClass(cComChilkatJsonObject)) To hoJsonToken If (Not(IsComObjectCreated(hoJsonToken))) Begin Send CreateComObject of hoJsonToken End Get ComLoadFile Of hoJsonToken "qa_data/tokens/okta_access_token.json" To iSuccess // Load the public keys (Okta web keys), one of which is needed to validate. // The web keys JSON looks like this: // { // "keys": [ // { // "kty": "RSA", // "alg": "RS256", // "kid": "anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ", // "use": "sig", // "e": "AQAB", // "n": "jT8uAgd5w ... euLB1HaVw" // }, // { // ... // } // ] // } Get Create (RefClass(cComChilkatJsonObject)) To hoJsonWebKeys If (Not(IsComObjectCreated(hoJsonWebKeys))) Begin Send CreateComObject of hoJsonWebKeys End Get ComLoadFile Of hoJsonWebKeys "qa_data/tokens/okta_web_keys.json" To iSuccess // ------------------------ // Step 1: Get the JOSE header from the JWT. The JOSE header contains JSON. One of the JSON members will be the key ID "kid" which identifies the web key to be used for validation. // Get Create (RefClass(cComChilkatJwt)) To hoJwt If (Not(IsComObjectCreated(hoJwt))) Begin Send CreateComObject of hoJwt End Get ComStringOf Of hoJsonToken "id_token" To sIdToken Get ComGetHeader Of hoJwt sIdToken To sJoseHeader Showln sJoseHeader // The joseHeader contains this: {"kid":"anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ","alg":"RS256"} Get Create (RefClass(cComChilkatJsonObject)) To hoJson If (Not(IsComObjectCreated(hoJson))) Begin Send CreateComObject of hoJson End Get ComLoad Of hoJson sJoseHeader To iSuccess Get ComStringOf Of hoJson "kid" To sKid Showln "kid to find: " sKid // ------------------------ // Step 2: Find the key with the same "kid" in the Okta web keys. Get Create (RefClass(cComChilkatStringBuilder)) To hoSbKid If (Not(IsComObjectCreated(hoSbKid))) Begin Send CreateComObject of hoSbKid End Move "" To e Move "" To n Move 0 To i Get ComSizeOfArray Of hoJsonWebKeys "keys" To iCount_i Move False To iBFound Move 0 To iIMatch While ((iBFound = False) And (i < iCount_i)) Set ComI Of hoJsonWebKeys To i Send ComClear To hoSbKid Get pvComObject of hoSbKid to vSbKid Get ComStringOfSb Of hoJsonWebKeys "keys[i].kid" vSbKid To iSuccess Get ComGetAsString Of hoSbKid To sTemp1 Showln "checking kid: " sTemp1 Get ComContentsEqual Of hoSbKid sKid True To bTemp1 If (bTemp1 = True) Begin Get ComStringOf Of hoJsonWebKeys "keys[i].e" To e Get ComStringOf Of hoJsonWebKeys "keys[i].n" To n // Exit the loop. Showln "Found matching kid." Move i To iIMatch Move True To iBFound End Move (i + 1) To i Loop If (iBFound = False) Begin Showln "No matching key ID found." Procedure_Return End Showln "Matching key:" Showln " exponent = " e Showln " modulus = " n // ------------------------ // Step 3: Load the RSA modulus and exponent into a Chilkat public key object. Get Create (RefClass(cComChilkatPublicKey)) To hoPubkey If (Not(IsComObjectCreated(hoPubkey))) Begin Send CreateComObject of hoPubkey End // Get the matching JSON key from the array of keys. Set ComI Of hoJsonWebKeys To iIMatch Get ComObjectOf Of hoJsonWebKeys "keys[i]" To vJsonWebKey If (IsComObject(vJsonWebKey)) Begin Get Create (RefClass(cComChilkatJsonObject)) To hoJsonWebKey Set pvComObject Of hoJsonWebKey To vJsonWebKey End Get ComEmit Of hoJsonWebKey To sTemp1 Get ComLoadFromString Of hoPubkey sTemp1 To iSuccess If (iSuccess = False) Begin Showln "Failed to load JSON web key." Get ComEmit Of hoJsonWebKey To sTemp1 Showln sTemp1 Get ComLastErrorText Of hoPubkey To sTemp1 Showln sTemp1 Send Destroy of hoJsonWebKey Procedure_Return End Send Destroy of hoJsonWebKey Showln "successfully loaded web key." // OK.. we have the desired JSON web key loaded into our public key object. // Now we can verify the access token. // ------------------------ // Step 4: Verify the access token. Get pvComObject of hoPubkey to vPubkey Get ComVerifyJwtPk Of hoJwt sIdToken vPubkey To iBVerified If (iBVerified = True) Begin Showln "The ID token is valid." End Else Begin Showln "The ID token is NOT valid." End // ------------------------ // Step 5: Extract the claims (payload) from the ID token and examine them.. Get ComGetPayload Of hoJwt sIdToken To sClaims Get Create (RefClass(cComChilkatJsonObject)) To hoJsonClaims If (Not(IsComObjectCreated(hoJsonClaims))) Begin Send CreateComObject of hoJsonClaims End Get ComLoad Of hoJsonClaims sClaims To iSuccess Set ComEmitCompact Of hoJsonClaims To False Get ComEmit Of hoJsonClaims To sTemp1 Showln sTemp1 // Sample claims: // { // "sub": "00utrr8ehubooPhjj356", // "ver": 1, // "iss": "https://dev-765951.okta.com/oauth2/default", // "aud": "0oatrr20vPYgVDlGr356", // "iat": 1562190727, // "exp": 1562194327, // "jti": "ID.JvlMhlnCj5ZqqGjk-jlgcOxHEyVUwIl9_Kpz69U2D_4", // "amr": [ // "pwd" // ], // "idp": "00os29azljkqyx99Q356", // "auth_time": 1562190726, // "at_hash": "SLMiVeyNWWEDaZ-O32nKMg" // } // The exp (expiry time) claim is the time at which this token will expire., expressed in Unix time. You should make sure that this time has not already passed. Get Create (RefClass(cComCkDateTime)) To hoDtExp If (Not(IsComObjectCreated(hoDtExp))) Begin Send CreateComObject of hoDtExp End Get ComIntOf Of hoJsonClaims "exp" To iTemp1 Get ComSetFromUnixTime Of hoDtExp False iTemp1 To iSuccess Get ComGetAsTimestamp Of hoDtExp False To sTemp1 Showln "expire timestamp = " sTemp1 // Check to see if this date/time expires within 0 seconds (i.e. is already past) Get ComExpiresWithin Of hoDtExp 0 "seconds" To iBExpired Showln "bExpired = " iBExpired End_Procedure |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.