Home Backend Development PHP Tutorial API Token Authentication

API Token Authentication

Nov 09, 2024 pm 08:44 PM

Introduction

In this article, I will explain API token authentication in an easy-to-understand manner using diagrams.
After having a rough understanding of how API token authentication works, I will explain how API token authentication works using Laravel Sanctum in a code-based manner.

By reading this article you will learn the following

  • How API Token Authentication Works
  • How to install Laravel Sanctum
  • Generating API Token at User Registration and Login
  • API token authentication to restrict access and verify resource ownership
  • Deletion of API token on logout

How API Token Authentication Works

API Token Authentication

1. User Registration/Login Request

Client sends the user’s login information (e.g., email, password) to Auth server.

2. User Authentication

Auth server verifies the login information to check if the user exists and if the password is correct.

3.  API Token Generation

Upon successful login, Auth server generates an API token for the user. The generated API token is stored in the personal_access_tokens table.

4. API Request

Client sends API request to Resource server, attaching the generated API token to the Authorization header.

5.  API Token Verification

Resource server verifies API token. If API token is valid, the request is processed.

6. API Response

Resource server returns API response.

How to install Laravel Sanctum

sail php artisan install:api
Copy after login
Copy after login
Copy after login
Copy after login

This command generates the api.php file and migration files needed for API token authentication under the Laravel project.

Then, execute the migration:

sail artisan migrate
Copy after login
Copy after login
Copy after login

This creates personal_access_tokens table.

2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Copy after login
Copy after login
Copy after login

Generating API Token at User Registration and Login

API Token Authentication

Sample Code

api.php

Route::post('/register', [AuthController::class, 'register']);
Copy after login
Copy after login

AuthController.php

public function register(Request $request)
{
    $fields = $request->validate([
        'name' => 'required|max:255',
        'email' => 'required|email|unique:users',
        'password' => 'required|confirmed'
    ]);

    $user = User::create($fields);

    $token = $user->createToken($request->name);

    return [
        'user' => $user,
        'token' => $token->plainTextToken
    ];
}
Copy after login

User Registration

  1. User registration.
  2. The new user is saved in the users table.
  3. An API token is generated. (createToken)
  4. The generated API token and user information are stored in the personal_access_tokens table, and API token is provided to the user.

Sample Code

api.php

*Route*::post('/login', [*AuthController*::class, 'login']);
Copy after login

AuthController.php

sail php artisan install:api
Copy after login
Copy after login
Copy after login
Copy after login

User Login

  1. User login.
  2. Verifies if the user exists in the users table.
  3. API token is generated after successful login. (createToken)
  4. The generated API token and user information are stored in the personal_access_tokens table, and API token is provided to the user.

*Note:A new API token is generated each time a user logs in.

API Token Generation

Using Postman, send an API request with the following conditions to check the response.

API Token Authentication

Upon successful login, an API token is generated.

API Token Authentication

You can check personal_access_tokens table to confirm that the logged-in user’s name and API token are saved.
*Note: The token in API response differs from the token in the personal_access_tokens table because it is hashed when stored in the database.

API Token Authentication

API Token Authentication

  1. User sends API request and includes API token in Authorization header.
  2. auth:sanctum middleware matches API token received from API request against API token stored in personal_access_tokens table.
  3. If API token is successfully authenticated, Resource server processes API request.
  4. The authenticated user can update or delete posts.
  5. Resource server returns API response.

Restrict access to post functions

The following is the sample code of CRUD process for posts associated with a user.

Sample code: PostController.php

Using Laravel Sanctum, restrict access so that only logged-in users can create, edit, and delete posts associated with a user.
Send actual API request to verify that API Token Authentication is performed correctly.

Access Control Standards

User APIs

  • index, show These actions provide generally public information and do not require API token authentication for better user experience and SEO.
  • store, update, delete To prevent unauthorized access and maintain data integrity, API token authentication is required.

Admin APIs

  • index, show, store, update, delete For enhanced security, APIs that do not need to be public should be secured by requiring user authentication for all controller actions.

Coding

It is also possible to restrict access to all endpoints of posts set in apiResource by writing the following in the routing file.

api.php

sail php artisan install:api
Copy after login
Copy after login
Copy after login
Copy after login
sail artisan migrate
Copy after login
Copy after login
Copy after login

In this case, we want to set API token authentication only for the store, update, and delete actions in the PostController. To do this, create a constructor method in PostController and apply the auth:sanctum middleware to all actions except index and show.

PostController.php

2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Copy after login
Copy after login
Copy after login

Now, users must include the token in the request when creating, updating, or deleting a post.

Testing this setup, if you send a request without the Authorization token for creating a post, a 401 error with an "Unauthenticated" message is returned, and the post creation fails.

API Token Authentication

If the Authorization token is included, the data is created successfully.

API Token Authentication

Similarly, the API for updating and deleting posts requires that the request be sent with the Token in the Authorization header.

Post Ownership Verification

User access restrictions have been implemented with API Token Authentication.
However, there is still a problem.
In its current state, authenticated users can update or delete another user's posts.
Add a process to verify that the user has ownership of the post.

API Token Authentication

  1. User sends API request and includes API token in Authorization header.
  2. auth:sanctum middleware matches API token received from API request against API token stored in the personal_access_tokens table.
  3. auth:sanctum middleware gets the user associated with API token and checks if this user has ownership of the target post.
  4. If API token is successfully authenticated and the user has ownership of the target post, Resource server will process API request.
  5. The authenticated user with ownership of posts can update and delete posts.
  6. Resource server returns API response.

Coding

Write authorization logic in the Laravel policy file so that only the users having the ownership of the posts can update and delete the posts.

PostController.php

sail php artisan install:api
Copy after login
Copy after login
Copy after login
Copy after login
  • Receiving a request
    • User sends API request and includes API token in the Authorization header.
  • Verification of Token
    • Resource server gets API token from the Authorization header of API request. And then verifies that API token received from the request matches API token stored in personal_access_tokens table.
  • User Identification
    • If the token is valid, the user associated with the token is identified. We can get the identified user with $request->user() method.
  • Calling a policy Gate::authorize method passes the authenticated user and the resource objects as arguments to the policy's methods.

PostPolicy.php

sail artisan migrate
Copy after login
Copy after login
Copy after login

modifymethod:

  • Arguments:
    • $user: Instance of the currently authenticated user.
    • $post: An instance of the Post model.
  • Logic:
    • Check whether the currently authenticated user has the ownership of the specified post.

Updating other users' post

API Token Authentication

  1. Set the post id as a path parameter to post update API endpoint.
  2. Include the token of a user who does not own this post in the Authorization header.
  3. Returns a 403 error message stating that you are not the owner of the post.

Deletion of API token on logout

API Token Authentication

Logout Flow

  1. User sends API request and includes API token in Authorization header
  2. auth:sanctum middleware matches API token received from API request against API token stored in the personal_access_tokens table.
  3. If API token is successfully authenticated, Resource server processes API request.
  4. Delete API token of the authenticated user from the personal_access_tokens table.
  5. Resource server returns API response.

Coding

api.php

2024_10_23_231407_create_personal_access_tokens_table ......... 3.84ms DONE
Copy after login
Copy after login
Copy after login

Apply the auth::sanctum middleware for logout routing and set API Token Authentication.

AuthController.php

Route::post('/register', [AuthController::class, 'register']);
Copy after login
Copy after login

The server will delete the current API token from the database. This makes the token invalid and cannot be used again.
The server returns a response to the client indicating that the logout was successful.

Summary

In this article, API token authentication was explained in an easy-to-understand manner using diagrams.
By leveraging Laravel Sanctum, simple and secure authentication can be achieved using API tokens, which allow clients to grant access rights to individual users with a flexibility that differs from session-based authentication. Using middleware and policies, API requests can also be efficiently protected, access restricted, and resource ownership verified.

The above is the detailed content of API Token Authentication. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

How to debug CLI mode in PHPStorm? How to debug CLI mode in PHPStorm? Apr 01, 2025 pm 02:57 PM

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

See all articles