verify (token) { let decoded = jwtToken.decode(token, {complete: true}) ; let payload = decoded.payload ; let crypt = new Crypt() ; let decrypt = crypt.decrypt(payload) ; try{ payload = JSON.parse(decrypt) ; }catch(e){ payload = decrypt ; } return payload ; }
getRealmName(req) { const token = this._decodeTokenString(this._getTokenStringFromRequest(req)); if (token && token.payload && token.payload.iss && token.payload.iss.startsWith(this.keycloakConfig['auth-server-url'])) { return this.getRealmNameFromToken(token); } return this.getRealmNameFromRequest(req); }
var getToken = function (req, next) { var bearerToken; var bearerHeader = req.headers["authorization"]; if (typeof bearerHeader !== 'undefined') { var bearer = bearerHeader.split(" "); bearerToken = bearer[1]; var token = jwt.decode(bearerToken, { complete: true }); try { if ((token.payload.exp <= moment().unix())) { next('token_expire') } else { //verificando mismo host de usuario if (token.payload.host !== requestIp.getClientIp(req)) { next('token_host_invalid') } else { next(null, token.payload) } } } catch (e) { next('token_host_invalid') } } else { return next('token_not_found') } }
const asymmetricAlgs = ['ES256', 'ES384', 'ES384', 'RS256', 'RS384', 'RS512']; const { alg, jku, kid } = decodedJwt.header; const { iss, sub } = decodedJwt.payload;
var getToken = function (req, next) { var bearerToken; var bearerHeader = req.headers["authorization"]; if (typeof bearerHeader !== 'undefined') { var bearer = bearerHeader.split(" "); bearerToken = bearer[1]; var token = jwt.decode(bearerToken, { complete: true }); try { if ((token.payload.exp <= moment().unix())) { next('token_expire') } else { //verificando mismo host de usuario if (token.payload.host !== requestIp.getClientIp(req)) { next('token_host_invalid') } else { next(null, token.payload) } } } catch (e) { next('token_host_invalid') } } else { return next('token_not_found') } }