Let JWT protect your API services

Let JWT protect your API services

Hello everyone, I am Dayao.

I have written an article about API service specifications before. The original article is here. The focus of the article on security issues is on obtaining tokens through appid, appkey, timestamp, nonce and sign, and using tokens to ensure the security of API services. Today we will talk about a more convenient way to generate tokens using jwt.

1. What is JWT

JSON Web Token(JWT) defines a compact and self-contained way to securely transmit information between parties as a JSON object. The information can be verified and trusted because it is digitally signed. JWT can have an expiration date.

JWT is a very long string, which consists of three parts: Header, Playload and Signature, separated by .

Headers

The Header part describes the basic information of JWT, which generally includes the signature algorithm and token type. The data is as follows:

  1. {
  2. "alg" : "RS256" ,
  3. "typ" : "JWT"  
  4. }

Playload

Playload is where valid information is stored. JWT specifies the following 7 fields, which are recommended but not mandatory:

  1. iss: jwt issuer
  2. sub: users that jwt is targeting
  3. aud: the party receiving jwt
  4. exp: jwt expiration time, this expiration time must be greater than the issuance time
  5. nbf: defines the time before which the jwt is unavailable
  6. iat: jwt issuance time
  7. jti: unique identifier of jwt, mainly used as a one-time token

In addition, we can also customize the content

  1. {
  2. "name" : "Java Journey" ,
  3. "age" :18
  4. }

Signature

Signature is the encrypted string of the first two parts of JWT. Headers and Playload are base64 encoded and encrypted using the encryption algorithm and key specified in Headers to obtain the third part of JWT.

2. JWT generation and parsing token

Introducing JWT dependency in application service

  1. <dependency>
  2. <groupId>io.jsonwebtoken</groupId>
  3. <artifactId>jjwt</artifactId>
  4. <version>0.9.0</version>
  5. </dependency>

According to the definition of JWT, a token encrypted using the RSA algorithm is generated with a validity period of 30 minutes.

  1. public   static String createToken( User   user ) throws Exception{
  2.  
  3. return Jwts.builder()
  4. .claim( "name" , user .getName())
  5. .claim( "age" , user .getAge())
  6. // rsa encryption
  7. .signWith(SignatureAlgorithm.RS256, RsaUtil.getPrivateKey(PRIVATE_KEY))
  8. // Valid for 30 minutes
  9. .setExpiration(DateTime.now().plusSeconds(30 * 60).toDate())
  10. .compact();
  11. }

After the login interface is verified, JWT is called to generate a token with the user ID and respond to the user. In the next request, the header carries the token for signature verification. After the signature verification is passed, the application service can be accessed normally.

  1. public   static Claims parseToken(String token) throws Exception{
  2. return Jwts
  3. .parser()
  4. .setSigningKey(RsaUtil.getPublicKey(PUBLIC_KEY))
  5. .parseClaimsJws(token)
  6. .getBody();
  7. }

3. Token renewal issue

The above describes the process of JWT verification. Now let's consider such a problem. The client carries the token to access the order interface. The token is verified, the client places the order successfully, and the order result is returned. Then the client calls the payment interface with the token to make payment. When verifying the signature, it is found that the token is invalid. What should be done at this time? Can only tell the user that the token is invalid, and then ask the user to log in again to get the token? This experience is very bad. Oauth2 does a better job in this regard. In addition to issuing tokens, it will also issue refresh_tokens. When the token expires, it will call refresh_token to re-acquire the token. If the refresh_token is also expired, the user will be prompted to log in again. Now we simulate the implementation of oauth2 to complete the refresh_token of JWT.

The idea is that after the user successfully logs in, a token is issued and an encrypted string is generated as a refresh_token. The refresh_token is stored in redis and a reasonable expiration time is set (the expiration time of the refresh_token is usually set to a longer time). Then the token and refresh_token are responded to the client. The pseudo code is as follows:

  1. @PostMapping( "getToken" )
  2. public ResultBean getToken(@RequestBody LoingUser user ){
  3.  
  4. ResultBean resultBean = new ResultBean();
  5. // User information verification failed, response error
  6. if(! user ){
  7. resultBean.fillCode(401, "The account password is incorrect" );
  8. return resultBean;
  9. }
  10. String token = null ;
  11. String refresh_token = null ;
  12. try {
  13. // jwt generated token
  14. token = JwtUtil.createToken( user );
  15. // Refresh token
  16. refresh_token = Md5Utils.hash(System.currentTimeMillis()+ "" );
  17. // refresh_token expires in 24 hours
  18. redisUtils.set ( "refresh_token:" +refresh_token,token,30*24*60*60);
  19. } catch (Exception e) {
  20. e.printStackTrace();
  21. }
  22.  
  23. Map<String,Object> map = new HashMap<>();
  24. map.put( "access_token" ,token);
  25. map.put( "refresh_token" ,refresh_token);
  26. map.put( "expires_in" ,2*60*60);
  27. resultBean.fillInfo(map);
  28. return resultBean;
  29. }

When the client calls the interface, it carries the token in the request header, intercepts the request in the interceptor, verifies the validity of the token, and if the token verification fails, checks redis to see if it is a refresh_token request. If the refresh_token verification also fails, responds to the client with an authentication exception, prompting the client to log in again. The pseudo code is as follows:

  1. HttpHeaders headers = request.getHeaders();
  2. // Get the token in the request header
  3. String token = headers.getFirst( "Authorization" );
  4. // Check if there is a token in the request header
  5. if (StringUtils.isEmpty(token)) {
  6. resultBean.fillCode(401, "Authentication failed, please bring a valid token" );
  7. return resultBean;
  8. }
  9. if(!token. contains ( "Bearer" )){
  10. resultBean.fillCode(401, "Authentication failed, please bring a valid token" );
  11. return resultBean;
  12. }
  13.  
  14. token = token.replace ( "Bearer " , "" );
  15. // If there is a token in the request header, parse the token
  16. try {
  17. Claims claims = TokenUtil.parseToken(token).getBody();
  18. } catch (Exception e) {
  19. e.printStackTrace();
  20. String refreshToken = redisUtils.get( "refresh_token:" + token)+ "" ;
  21. if(StringUtils.isBlank(refreshToken) || "null" .equals(refreshToken)){
  22. resultBean.fillCode(403, "refresh_token has expired, please get a new token" );
  23. return resultbean;
  24. }
  25. }

The pseudo code for refreshing_token to exchange for token is as follows:

  1. @PostMapping( "refreshToken" )
  2. public Result refreshToken(String token){
  3.  
  4. ResultBean resultBean = new ResultBean();
  5. String refreshToken = redisUtils.get(TokenConstants.REFRESHTOKEN + token)+ "" ;
  6. String access_token = null ;
  7. try {
  8. Claims claims = JwtUtil.parseToken(refreshToken);
  9. String username = claims.get( "username" )+ "" ;
  10. String password = claims.get( "password" )+ "" ;
  11. LoginUser loginUser = new LoginUser();
  12. loginUser.setUsername(username);
  13. loginUser.setPassword( password );
  14. access_token = JwtUtil.createToken(loginUser);
  15. } catch (Exception e) {
  16. e.printStackTrace();
  17. }
  18. Map<String,Object> map = new HashMap<>();
  19. map.put( "access_token" ,access_token);
  20. map.put( "refresh_token" ,token);
  21. map.put( "expires_in" ,30*60);
  22. resultBean.fillInfo(map);
  23. return resultBean;
  24. }

Through the above analysis, we have simply implemented the token issuance, verification and renewal issues. As a lightweight authentication framework, JWT is very convenient to use, but there are also some problems.

  • The Playload part of JWT is only base64 encoded, so our information is actually completely exposed. Generally, sensitive information should not be stored in JWT.
  • The token generated by JWT is relatively long. Carrying the token in the request header each time will cause the request size to be relatively large, which will cause certain performance issues.
  • After the JWT is generated, the server cannot discard it and can only wait for the JWT to expire automatically.

The following is a paragraph I saw online about a scenario where JWT is more applicable:

  • Short validity period
  • Only want to be used once

For example, after a user registers, an email is sent to him to activate his account. Usually, there needs to be a link in the email. This link needs to have the following characteristics: it can identify the user, the link is time-sensitive (usually only allowed to be activated within a few hours), it cannot be tampered with to activate other possible accounts, and it is one-time. This scenario is suitable for using JWT.

This article is reprinted from the WeChat public account "Java Journey", which can be followed through the following QR code. To reprint this article, please contact the Java Journey public account.

<<:  Apple CEO Cook: 5G promotion is still in the "early stages"

>>:  HTTP 2.0 Interview Pass: Mandatory Caching and Negotiated Caching

Recommend

Linkerd 2.10 (Step by Step)—Install Multi-Cluster Components

[[406693]] The Linkerd 2.10 Chinese manual is bei...

Wi-Fi vs. Ethernet: Which should you use and why?

Not long ago, you had to choose between a wired o...

An article to understand the IPIP network mode of calico

[[397426]] Preface This article mainly analyzes t...

India issues 5G trial license, but won't use Chinese network technology

The decision to exclude the Chinese manufacturer ...

What is a VPN and why is it important for SD-WAN?

Internet-based virtual private networks (VPNs) we...

Why are there so many different communication protocols in industrial sites?

This is a big question, so I will briefly talk ab...