Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Verify Okta ID Token LocallyThis example demonstrates how to validate an Okta ID token using Chilkat's JWT class. For more information, see https://developer.okta.com/docs/guides/validate-id-tokens/overview/
#include <C_CkJsonObjectW.h> #include <C_CkJwtW.h> #include <C_CkStringBuilderW.h> #include <C_CkPublicKeyW.h> #include <C_CkDateTimeW.h> void ChilkatSample(void) { HCkJsonObjectW jsonToken; BOOL success; HCkJsonObjectW jsonWebKeys; HCkJwtW jwt; const wchar_t *idToken; const wchar_t *joseHeader; HCkJsonObjectW json; const wchar_t *kid; HCkStringBuilderW sbKid; const wchar_t *e; const wchar_t *n; int i; int count_i; BOOL bFound; int iMatch; HCkPublicKeyW pubkey; HCkJsonObjectW jsonWebKey; BOOL bVerified; const wchar_t *claims; HCkJsonObjectW jsonClaims; HCkDateTimeW dtExp; BOOL bExpired; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // This example begins with two JSON files: // // 1. The access + id token obtained from Okta as shown in one fo these examples: // Get Okta Token using Resource Owner Password Flow // // 2. The Okta web keys obtained by this example: Get Okta Web Keys // // // ---------------------------------------------------------------- // Note: The very last step of this example is where the claims, such as iss, aud, iat, exp, and nonce // are extracted from the ID token and examined. // ---------------------------------------------------------------- // Load the access/id token to be verified. // It contains JSON that looks like this: // { // "access_token": "eyJraWQiOiJhb ... O_eVu-kBp6g", // "token_type": "Bearer", // "expires_in": 3600, // "scope": "openid", // "id_token": "eyJraWQi ... FrL9WOuwbQtUg" // } // This example verifies the id_token. (The access_token is verified in this example: Verify Okta Access Token jsonToken = CkJsonObjectW_Create(); success = CkJsonObjectW_LoadFile(jsonToken,L"qa_data/tokens/okta_access_token.json"); // Load the public keys (Okta web keys), one of which is needed to validate. // The web keys JSON looks like this: // { // "keys": [ // { // "kty": "RSA", // "alg": "RS256", // "kid": "anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ", // "use": "sig", // "e": "AQAB", // "n": "jT8uAgd5w ... euLB1HaVw" // }, // { // ... // } // ] // } jsonWebKeys = CkJsonObjectW_Create(); success = CkJsonObjectW_LoadFile(jsonWebKeys,L"qa_data/tokens/okta_web_keys.json"); // ------------------------ // Step 1: Get the JOSE header from the JWT. The JOSE header contains JSON. One of the JSON members will be the key ID "kid" which identifies the web key to be used for validation. // jwt = CkJwtW_Create(); idToken = CkJsonObjectW_stringOf(jsonToken,L"id_token"); joseHeader = CkJwtW_getHeader(jwt,idToken); wprintf(L"%s\n",joseHeader); // The joseHeader contains this: {"kid":"anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ","alg":"RS256"} json = CkJsonObjectW_Create(); CkJsonObjectW_Load(json,joseHeader); kid = CkJsonObjectW_stringOf(json,L"kid"); wprintf(L"kid to find: %s\n",kid); // ------------------------ // Step 2: Find the key with the same "kid" in the Okta web keys. sbKid = CkStringBuilderW_Create(); e = L""; n = L""; i = 0; count_i = CkJsonObjectW_SizeOfArray(jsonWebKeys,L"keys"); bFound = FALSE; iMatch = 0; while ((bFound == FALSE) && (i < count_i)) { CkJsonObjectW_putI(jsonWebKeys,i); CkStringBuilderW_Clear(sbKid); CkJsonObjectW_StringOfSb(jsonWebKeys,L"keys[i].kid",sbKid); wprintf(L"checking kid: %s\n",CkStringBuilderW_getAsString(sbKid)); if (CkStringBuilderW_ContentsEqual(sbKid,kid,TRUE) == TRUE) { e = CkJsonObjectW_stringOf(jsonWebKeys,L"keys[i].e"); n = CkJsonObjectW_stringOf(jsonWebKeys,L"keys[i].n"); // Exit the loop. wprintf(L"Found matching kid.\n"); iMatch = i; bFound = TRUE; } i = i + 1; } if (bFound == FALSE) { wprintf(L"No matching key ID found.\n"); CkJsonObjectW_Dispose(jsonToken); CkJsonObjectW_Dispose(jsonWebKeys); CkJwtW_Dispose(jwt); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbKid); return; } wprintf(L"Matching key:\n"); wprintf(L" exponent = %s\n",e); wprintf(L" modulus = %s\n",n); // ------------------------ // Step 3: Load the RSA modulus and exponent into a Chilkat public key object. pubkey = CkPublicKeyW_Create(); // Get the matching JSON key from the array of keys. CkJsonObjectW_putI(jsonWebKeys,iMatch); jsonWebKey = CkJsonObjectW_ObjectOf(jsonWebKeys,L"keys[i]"); success = CkPublicKeyW_LoadFromString(pubkey,CkJsonObjectW_emit(jsonWebKey)); if (success == FALSE) { wprintf(L"Failed to load JSON web key.\n"); wprintf(L"%s\n",CkJsonObjectW_emit(jsonWebKey)); wprintf(L"%s\n",CkPublicKeyW_lastErrorText(pubkey)); CkJsonObjectW_Dispose(jsonWebKey); CkJsonObjectW_Dispose(jsonToken); CkJsonObjectW_Dispose(jsonWebKeys); CkJwtW_Dispose(jwt); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbKid); CkPublicKeyW_Dispose(pubkey); return; } CkJsonObjectW_Dispose(jsonWebKey); wprintf(L"successfully loaded web key.\n"); // OK.. we have the desired JSON web key loaded into our public key object. // Now we can verify the access token. // ------------------------ // Step 4: Verify the access token. bVerified = CkJwtW_VerifyJwtPk(jwt,idToken,pubkey); if (bVerified == TRUE) { wprintf(L"The ID token is valid.\n"); } else { wprintf(L"The ID token is NOT valid.\n"); } // ------------------------ // Step 5: Extract the claims (payload) from the ID token and examine them.. claims = CkJwtW_getPayload(jwt,idToken); jsonClaims = CkJsonObjectW_Create(); CkJsonObjectW_Load(jsonClaims,claims); CkJsonObjectW_putEmitCompact(jsonClaims,FALSE); wprintf(L"%s\n",CkJsonObjectW_emit(jsonClaims)); // Sample claims: // { // "sub": "00utrr8ehubooPhjj356", // "ver": 1, // "iss": "https://dev-765951.okta.com/oauth2/default", // "aud": "0oatrr20vPYgVDlGr356", // "iat": 1562190727, // "exp": 1562194327, // "jti": "ID.JvlMhlnCj5ZqqGjk-jlgcOxHEyVUwIl9_Kpz69U2D_4", // "amr": [ // "pwd" // ], // "idp": "00os29azljkqyx99Q356", // "auth_time": 1562190726, // "at_hash": "SLMiVeyNWWEDaZ-O32nKMg" // } // The exp (expiry time) claim is the time at which this token will expire., expressed in Unix time. You should make sure that this time has not already passed. dtExp = CkDateTimeW_Create(); CkDateTimeW_SetFromUnixTime(dtExp,FALSE,CkJsonObjectW_IntOf(jsonClaims,L"exp")); wprintf(L"expire timestamp = %s\n",CkDateTimeW_getAsTimestamp(dtExp,FALSE)); // Check to see if this date/time expires within 0 seconds (i.e. is already past) bExpired = CkDateTimeW_ExpiresWithin(dtExp,0,L"seconds"); wprintf(L"bExpired = %d\n",bExpired); CkJsonObjectW_Dispose(jsonToken); CkJsonObjectW_Dispose(jsonWebKeys); CkJwtW_Dispose(jwt); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbKid); CkPublicKeyW_Dispose(pubkey); CkJsonObjectW_Dispose(jsonClaims); CkDateTimeW_Dispose(dtExp); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.