API Token Authentication
Introduction
In this article, I will explain API token authentication in an easy-to-understand manner using diagrams.
After having a rough understanding of how API token authentication works, I will explain how API token authentication works using Laravel Sanctum in a code-based manner.
By reading this article you will learn the following
- How API Token Authentication Works
- How to install Laravel Sanctum
- Generating API Token at User Registration and Login
- API token authentication to restrict access and verify resource ownership
- Deletion of API token on logout
How API Token Authentication Works
1. User Registration/Login Request
Client sends the user’s login information (e.g., email, password) to Auth server.
2. User Authentication
Auth server verifies the login information to check if the user exists and if the password is correct.
3. API Token Generation
Upon successful login, Auth server generates an API token for the user. The generated API token is stored in the personal_access_tokens table.
4. API Request
Client sends API request to Resource server, attaching the generated API token to the Authorization header.
5. API Token Verification
Resource server verifies API token. If API token is valid, the request is processed.
6. API Response
Resource server returns API response.
How to install Laravel Sanctum
sail php artisan install:api
This command generates the api.php file and migration files needed for API token authentication under the Laravel project.
Then, execute the migration:
sail artisan migrate
This creates personal_access_tokens table.
2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Generating API Token at User Registration and Login
Sample Code
api.php
Route::post('/register', [AuthController::class, 'register']);
AuthController.php
public function register(Request $request) { $fields = $request->validate([ 'name' => 'required|max:255', 'email' => 'required|email|unique:users', 'password' => 'required|confirmed' ]); $user = User::create($fields); $token = $user->createToken($request->name); return [ 'user' => $user, 'token' => $token->plainTextToken ]; }
User Registration
- User registration.
- The new user is saved in the users table.
- An API token is generated. (createToken)
- The generated API token and user information are stored in the personal_access_tokens table, and API token is provided to the user.
Sample Code
api.php
*Route*::post('/login', [*AuthController*::class, 'login']);
AuthController.php
sail php artisan install:api
User Login
- User login.
- Verifies if the user exists in the users table.
- API token is generated after successful login. (createToken)
- The generated API token and user information are stored in the personal_access_tokens table, and API token is provided to the user.
*Note:A new API token is generated each time a user logs in.
API Token Generation
Using Postman, send an API request with the following conditions to check the response.
Upon successful login, an API token is generated.
You can check personal_access_tokens table to confirm that the logged-in user’s name and API token are saved.
*Note: The token in API response differs from the token in the personal_access_tokens table because it is hashed when stored in the database.
API Token Authentication
- User sends API request and includes API token in Authorization header.
- auth:sanctum middleware matches API token received from API request against API token stored in personal_access_tokens table.
- If API token is successfully authenticated, Resource server processes API request.
- The authenticated user can update or delete posts.
- Resource server returns API response.
Restrict access to post functions
The following is the sample code of CRUD process for posts associated with a user.
Sample code: PostController.php
Using Laravel Sanctum, restrict access so that only logged-in users can create, edit, and delete posts associated with a user.
Send actual API request to verify that API Token Authentication is performed correctly.
Access Control Standards
User APIs
- index, show These actions provide generally public information and do not require API token authentication for better user experience and SEO.
- store, update, delete To prevent unauthorized access and maintain data integrity, API token authentication is required.
Admin APIs
- index, show, store, update, delete For enhanced security, APIs that do not need to be public should be secured by requiring user authentication for all controller actions.
Coding
It is also possible to restrict access to all endpoints of posts set in apiResource by writing the following in the routing file.
api.php
sail php artisan install:api
sail artisan migrate
In this case, we want to set API token authentication only for the store, update, and delete actions in the PostController. To do this, create a constructor method in PostController and apply the auth:sanctum middleware to all actions except index and show.
PostController.php
2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Now, users must include the token in the request when creating, updating, or deleting a post.
Testing this setup, if you send a request without the Authorization token for creating a post, a 401 error with an "Unauthenticated" message is returned, and the post creation fails.
If the Authorization token is included, the data is created successfully.
Similarly, the API for updating and deleting posts requires that the request be sent with the Token in the Authorization header.
Post Ownership Verification
User access restrictions have been implemented with API Token Authentication.
However, there is still a problem.
In its current state, authenticated users can update or delete another user's posts.
Add a process to verify that the user has ownership of the post.
- User sends API request and includes API token in Authorization header.
- auth:sanctum middleware matches API token received from API request against API token stored in the personal_access_tokens table.
- auth:sanctum middleware gets the user associated with API token and checks if this user has ownership of the target post.
- If API token is successfully authenticated and the user has ownership of the target post, Resource server will process API request.
- The authenticated user with ownership of posts can update and delete posts.
- Resource server returns API response.
Coding
Write authorization logic in the Laravel policy file so that only the users having the ownership of the posts can update and delete the posts.
PostController.php
sail php artisan install:api
- Receiving a request
- User sends API request and includes API token in the Authorization header.
- Verification of Token
- Resource server gets API token from the Authorization header of API request. And then verifies that API token received from the request matches API token stored in personal_access_tokens table.
- User Identification
- If the token is valid, the user associated with the token is identified. We can get the identified user with $request->user() method.
- Calling a policy Gate::authorize method passes the authenticated user and the resource objects as arguments to the policy's methods.
PostPolicy.php
sail artisan migrate
modifymethod:
- Arguments:
- $user: Instance of the currently authenticated user.
- $post: An instance of the Post model.
- Logic:
- Check whether the currently authenticated user has the ownership of the specified post.
Updating other users' post
- Set the post id as a path parameter to post update API endpoint.
- Include the token of a user who does not own this post in the Authorization header.
- Returns a 403 error message stating that you are not the owner of the post.
Deletion of API token on logout
Logout Flow
- User sends API request and includes API token in Authorization header
- auth:sanctum middleware matches API token received from API request against API token stored in the personal_access_tokens table.
- If API token is successfully authenticated, Resource server processes API request.
- Delete API token of the authenticated user from the personal_access_tokens table.
- Resource server returns API response.
Coding
api.php
2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Apply the auth::sanctum middleware for logout routing and set API Token Authentication.
AuthController.php
Route::post('/register', [AuthController::class, 'register']);
The server will delete the current API token from the database. This makes the token invalid and cannot be used again.
The server returns a response to the client indicating that the logout was successful.
Summary
In this article, API token authentication was explained in an easy-to-understand manner using diagrams.
By leveraging Laravel Sanctum, simple and secure authentication can be achieved using API tokens, which allow clients to grant access rights to individual users with a flexibility that differs from session-based authentication. Using middleware and policies, API requests can also be efficiently protected, access restricted, and resource ownership verified.
The above is the detailed content of API Token Authentication. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.
