Auth is a library designed to take the complexity out of multi-factor and high-security authentication in PHP projects. Data is stored in JWTs which are tamper-resistant, permitting authentication information to be stored completely client-side without the need for a database1.
By implementing a single interface, your existing PHP app can flexibly support MFA without being tied to a specific provider or implementation. Thanks to being based on open standards, the authentication data can be used with any framework, and even ported to other programming languages.
<?php
use Firehed\Auth;
use Firehed\JWT;
use Firehed\Security\Secret;
// General setup
$keys = new JWT\KeyContainer();
$keys->addKey('20130101',
JWT\Algorithm::HMAC_SHA_256(),
new Secret('some randomly-generated secret'));
$auth = new Auth\Auth();
$auth->setKeys($keys)
->setLoader(function($uid): Auth\Authable {
return (new User())->find($uid);
});
// Authenticating a user
$user = User::findByEmail($_POST['email']);
$password = new Auth\Factors\KnowledgeFactor(new Secret($_POST['password'));
$auth->setUser($user);
try {
$auth->validateFactor($password);
setcookie('auth_token',
$auth->getEncodedToken(),
time()+(86400*90),
'/',
'yourdomain.com',
true,
true);
} catch (Auth\Exceptions\AuthException $e) {
// password was incorrect
}
// Accessing a previously-authenticated user
try {
$user = $auth->setEncodedToken($_COOKIE['auth_token'])
->setRequiredLevel(Auth\Level::LOGIN())
->getUser();
} catch (Auth\Exceptions\AuthException $e) {
// Authentication failed, prompt for login
header('Location: /login');
}
Installation is supported through Composer:
composer require firehed/auth
For more information, please visit the Composer website
Restore an authentication session from an encoded JWT. This method will be mostly used on logged-in pages.
Start an authentication session for a new user. This method will be mostly used during the start of a login flow.
Provide a callback that will return a Firehed\Auth\Authable object provided
a unique identifier. This will be used alongside setEncodedToken
to allow
getUser
to function on restored sessions.
It must have the following signature:
function($uid): Firehed\Auth\Authable
Provide the authentication level required for getUser
to return a user. This
defaults to Level::LOGIN
.
Get a JWT containing the authentication data for the current user. This does not contain sensitive data, and is tamper-resistant thanks to signing. You SHOULD store the encoded token client-side, so long as transmission is done securely (this applies to any session identifier). Note that this does include the user's own ID.
Get the authenticated user. If the user is insufficiently authenticated, this will throw an exception, preventing accidental access.
Use the provided factor to start a high-security session. It will last until the expiration time on the factor. If no expiration time is set, it will only last until the end of the request.
Exit high-security mode regardless of the time remaining.
Authenticate the user with the provided factor.
Remove the authentication data provided by the specified factor type. Most commonly, this will be used to log the user out.
Provides a KeyContainer that's used internally for JWT handling. This allows key rotation to be seamless and nearly-automatic
- Authentication: the act of verifying identity
- Factor: a method of authentication. There are three different factors:
- Inherence: something a user is, such as a fingerprint
- Knowledge: something a user knows, such as a passphrase
- Possession: something a user has, such as a OTP token
- High-security mode: conceptually similar to
sudo
, this is a way to protect especially-sensitive actions (password change, credit card management, etc.) by requiring a fresh authentication. - Levels: there are four authentication levels that a page can require:
ANONYMOUS
: Users are not authenticated at all, nor will one be returned bygetUser
PARTIAL
: Allows validation methods to be called on a partially- authencitaed user, although getUser() will return null. This SHOULD NOT be used outside of an autentication upgrade flow; i.e. providing their OTP code or token. Use getPartiallyAuthenticatedUser() to get at the underlying user, which SHOULD be used ONLY for modifying the user's new factor registration (e.g. TOTP code provided didn't match)LOGIN
: Users require all of their factors to be presentHISEC
: In addition to all factors being present, one must have been explicitly re-verified via theenterHighSecurity
API
(new examples coming soon)
Footnotes
-
Of course, you will still need to securely store password hashes, OTP shared secrets, etc. What you will not need to do is muck around with existing session storage and handling. ↩