This tutorial demonstrates how to add authorization to a Ruby on Rails API.We recommend that you log in to follow this quickstart with examples configured for your account.
In the APIs section of the Auth0 dashboard, click Create API. Provide a name and an identifier for your API, for example, https://quickstarts/api. You will use the identifier as an audience later, when you are configuring the Access Token verification. Leave the Signing Algorithm as RS256.
By default, your API uses RS256 as the algorithm for signing tokens. Since RS256 uses a private/public keypair, it verifies the tokens against the public key for your Auth0 account. The public key is in the JSON Web Key Set (JWKS) format, and can be accessed here.
Permissions let you define how resources can be accessed on behalf of the user with a given access token. For example, you might choose to grant read access to the messages resource if users have the manager access level, and a write access to that resource if they have the administrator access level.You can define allowed permissions in the Permissions view of the Auth0 Dashboard’s APIs section.
This example uses the read:messages scope.
This example demonstrates:
How to check for a JSON Web Token (JWT) in the Authorization header of an incoming HTTP request.
This tutorial performs access token validation using the jwt Gem within a custom Auth0Client class. A Concern called Secured is used to authorize endpoints which require authentication through an incoming access token.Install the jwt Gem.
Create a class called Auth0Client which decodes and verifies the incoming access token taken from the Authorization header of the request. The public key for your Auth0 tenant can be fetched to verify the token.
Create a Concern called Secured which looks for the access token in the Authorization header of an incoming request. If the token is present, it should be passed to Auth0Client.validate_token.
The Auth0Client.validate_token method above verifies that the access token included in the request is valid; however, it doesn’t yet include any mechanism for checking that the token has the sufficient scope to access the requested resources.To look for a particular scope in an access token, create a new struct in your Auth0Client class called Token and define a new method inside, validate_permissions, that given an array of required scopes it will check if they are present in the payload of the token.Go to the Auth0Client class. Add the new Token struct and update the return value of the validate_token method as follows:
Next, in the Secured concern, define a new error constant INSUFFICIENT_PERMISSIONS to return a proper error message in case there was a attempt to request a resource without the right permissions. Next, update the return value of the Auth0Client.validate_token call and finally create a new method validate_permissions where to check if the token has the right permissions, or return a 403 FORBIDDEN status code with the INSUFFICIENT_PERMISSIONS error message otherwise.Apply these changes in your Secured concern by adding the following code:
Report incorrect code
Copy
Ask AI
# app/controllers/concerns/secured.rb# frozen_string_literal: truemodule Secured extend ActiveSupport::Concern # ... INSUFFICIENT_PERMISSIONS = { error: 'insufficient_permissions', error_description: 'The access token does not contain the required permissions', message: 'Permission denied' }.freeze def authorize token = token_from_request return if performed? validation_response = Auth0Client.validate_token(token) @decoded_token = validation_response.decoded_token # Add this line return unless (error = validation_response.error) render json: { message: error.message }, status: error.status end def validate_permissions(permissions) raise 'validate_permissions needs to be called with a block' unless block_given? return yield if @decoded_token.validate_permissions(permissions) render json: INSUFFICIENT_PERMISSIONS, status: :forbidden end private # ... end
The routes shown below are available for the following requests:
GET /api/public: available for non-authenticated requests
GET /api/private: available for authenticated requests containing an access token with no additional scopes
GET /api/private-scoped: available for authenticated requests containing an access token with the read:messages scope granted
Add the Secured concern to the ApplicationController:
Report incorrect code
Copy
Ask AI
class ApplicationController < ActionController::API include Securedend
You only ned to protect the PrivateController as follows:
Report incorrect code
Copy
Ask AI
class PrivateController < ApplicationController before_action :authorize # ...end
In order to check that your access token has the right permissions, call the validate_permissions method as follows in the private-scoped action:
Report incorrect code
Copy
Ask AI
class PrivateController < ApplicationController before_action :authorize def private render json: { message: 'Hello from a private endpoint! You need to be authenticated to see this.' } end def private_scoped validate_permissions ['read:messages'] do render json: { message: 'Hello from a private endpoint! You need to be authenticated and have a scope of read:messages to see this.' } end endend