ReactiveX enhanced OIDC and OAuth2 protocol support for browser-based JavaScript applications.
Go to file
lonelyhentxi 983254164b
Some checks are pending
Build, Lint & Test Lib / Built, Lint and Test Library (push) Waiting to run
Build, Lint & Test Lib / Angular latest (push) Blocked by required conditions
Build, Lint & Test Lib / Angular latest & Schematics Job (push) Blocked by required conditions
Build, Lint & Test Lib / Angular latest Standalone & Schematics Job (push) Blocked by required conditions
Build, Lint & Test Lib / Angular 16 & RxJs 6 (push) Blocked by required conditions
Build, Lint & Test Lib / Angular V16 (push) Blocked by required conditions
Docs / Build and Deploy Docs Job (push) Waiting to run
Docs / Close Pull Request Job (push) Waiting to run
feat: init and fork some code from angular-auth-oidc-client
2025-01-17 04:24:12 +08:00
.github feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
.vscode feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
src feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
test feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
.editorconfig feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
.gitignore feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
biome.json feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
karma.conf.js feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
lefthook.yml feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
LICENSE Initial commit 2025-01-16 04:31:02 +08:00
license-banner.txt feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
package.json feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
pnpm-lock.yaml feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
README.md feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
rslib.config.ts feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
tsconfig.json feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
tsconfig.lib.json feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00
tsconfig.spec.json feat: init and fork some code from angular-auth-oidc-client 2025-01-17 04:24:12 +08:00

Angular Lib for OpenID Connect & OAuth2

Build Status npm npm npm code style: prettier Coverage Status

Secure your Angular app using the latest standards for OpenID Connect & OAuth2. Provides support for token refresh, all modern OIDC Identity Providers and more.

Acknowledgements

This library is certified by OpenID Foundation. (RP Implicit and Config RP)

Features

Installation

Ng Add

You can use the schematics and ng add the library.

ng add angular-auth-oidc-client

And answer the questions. A module will be created which encapsulates your configuration.

angular-auth-oidc-client schematics

Npm / Yarn

Navigate to the level of your package.json and type

 npm install angular-auth-oidc-client

or with yarn

 yarn add angular-auth-oidc-client

Documentation

Read the docs here

Samples

Explore the Samples here

Quickstart

For the example of the Code Flow. For further examples please check the Samples Section.

If you have done the installation with the schematics, these modules and files should be available already!

Configuration

Import the AuthModule in your module.

import { NgModule } from '@angular/core';
import { AuthModule, LogLevel } from 'angular-auth-oidc-client';
// ...

@NgModule({
  // ...
  imports: [
    // ...
    AuthModule.forRoot({
      config: {
        authority: '<your authority address here>',
        redirectUrl: window.location.origin,
        postLogoutRedirectUri: window.location.origin,
        clientId: '<your clientId>',
        scope: 'openid profile email offline_access',
        responseType: 'code',
        silentRenew: true,
        useRefreshToken: true,
        logLevel: LogLevel.Debug,
      },
    }),
  ],
  // ...
})
export class AppModule {}

And call the method checkAuth() from your app.component.ts. The method checkAuth() is needed to process the redirect from your Security Token Service and set the correct states. This method must be used to ensure the correct functioning of the library.

import { Component, OnInit, inject } from '@angular/core';
import { OidcSecurityService } from 'angular-auth-oidc-client';

@Component({
  /*...*/
})
export class AppComponent implements OnInit {
  private readonly oidcSecurityService = inject(OidcSecurityService);

  ngOnInit() {
    this.oidcSecurityService
      .checkAuth()
      .subscribe((loginResponse: LoginResponse) => {
        const { isAuthenticated, userData, accessToken, idToken, configId } =
          loginResponse;

        /*...*/
      });
  }

  login() {
    this.oidcSecurityService.authorize();
  }

  logout() {
    this.oidcSecurityService
      .logoff()
      .subscribe((result) => console.log(result));
  }
}

Using the access token

You can get the access token by calling the method getAccessToken() on the OidcSecurityService

const token = this.oidcSecurityService.getAccessToken().subscribe(...);

And then you can use it in the HttpHeaders

import { HttpHeaders } from '@angular/common/http';

const token = this.oidcSecurityServices.getAccessToken().subscribe((token) => {
  const httpOptions = {
    headers: new HttpHeaders({
      Authorization: 'Bearer ' + token,
    }),
  };
});

You can use the built in interceptor to add the accesstokens to your request

AuthModule.forRoot({
  config: {
    // ...
    secureRoutes: ['https://my-secure-url.com/', 'https://my-second-secure-url.com/'],
  },
}),
 providers: [
    { provide: HTTP_INTERCEPTORS, useClass: AuthInterceptor, multi: true },
  ],

Versions

Current Version is Version 19.x

License

MIT

Authors