This article is a continuation to the previous MEAN Stack user registration project. Here we extend the same project by implementing JWT Authentication in Node JS using NPM Packages jsonwebtoken and passport.js.
Please watch this 10min tutorial for understanding JWT Authentication in depth:
GitHub link up-to this article : https://goo.gl/f1Q6cT
So far we have discussed following related topics in MEAN Stack:
- CRUD Operation – Insert Update View and Delete.
- User Registration
Node JS Back End.
Angular 6 Front End. - JWT User Authentication
Node JS Back End.( this article)
Install Required NPM Packages
In addition to the existing packages, let’s install few more packages – jsonwebtoken, passport, passport-local and lodash.
npm i --save jsonwebtoken passport passport-local lodash
Configure Passport for Local Authentication
Passport can act as an authentication middleware in NodeJS Application. It makes the process more easier. It has various strategy for authentication.
Eg : local strategy(using username and password) , strategy using social accounts like facebook, twitter, gmail etc.
In this project we’ll use email and password as user credentials for authentication.Lets check how to configure passport local strategy with passportConfig.js file.
use function from passport will configure the middleware. Inside the function, an object of localStrategy is a passed with one option and a call back function.
For option, we mention usernameField = email. because by default local strategy uses username and password but for this application we will use email instead of username.
Inside the callback function, we have defined user authentication criteria for both success and failure with the help of findOne function from mongoose. this callback function will get executed when actual authenticate function from passport is called.
Now we have to add following lines in Node JS route file – app.js.
Add Post Route For User Authentication
To implement user authentication, we’ll add a route function – authenticate inside user.controller.js.
As soon as we call the authenticate function from passport, the middleware function that we just created will be executed after that the callback function inside this authenticate function will called. parameter for this function passed though done from middleware callback function. If the authentication is successful jwt token is generated using generateJwt function from user model.
Now we have to define function generateJwt in user.model.js file.
In-order to generate the jwt token we just need to call sign function from jsonwebtoken.
first parameter is the payload for the token. inside that we will provide various claims or information about the user. here we stored user id(_id) from mongoDB user record. we can pass as much as details we want, but don’t store unwanted information inside payload, it will make the token bigger in size. This payload is stored in jwt as result of encoding not encryption. so NEVER store security information like password in this payload.
second parameter is the secret code for the encryption of signature part. Last parameter is the token expiration time.
both of these secret code and expiration time is stored in config.json file as follows.
Update index.router.js for this new authenticate route as follows.
Now we can make a post request – /api/authenticate with email and password. If there is a user with given credential then jwt token can be received at client side. Normally we save this token in browser local storage because we need the token in order to access private routes from Node JS API.
Secure Private Routes in Node JS Using jsonwebtoken
In-order to access private routes, the request must have the valid jwt token. In server side node js application, jsonwebtoken will verify the attached token. If it is valid then only the secured private route get consumed.
So let’s check how to verify jwt. for that I’ll add new file jwtHelper.js as follows.
If you make request to consume private you should add jwt in header as follows.
AUTHORIZATION : bearer [jwt]
Inside verifyJwtToken function, we split Authorization header by space and stores the jwt inside token variable. If there is a token in request header then we call verify function from jsonwebtoken. Inside the function callback we ‘ll have the decoded payload. that means user id(_id) stored during token generation can be retrieved here. we will save the payload in request so that private routes can use these values.
User Profile
Here I’ll add new route UserProfile then we will make route as private. Define router function userProfile in user.controller.js.
From this function, we return details of the current user. user id decoded during token verification is used here – req._id. In-order to pick few properties from user object we use lodash function pick.
Now let’s make this route as private.For that you can do the following in index.router.js.
Done. In the next article we will add client side Angular 6 login and logout component to this MEAN Stack Project.
I am getting this error when i try to post in “postman” – “expiresIn” should be a number of seconds or string representing a timespan”.
Kindly help.
I’m getting this error in Postman “Cannot POST /api/authenticate”
Kindly help
Plz drop me a message on my mail i need ur help!!
Hello i need your help in this project!!
is it possibe to generate tokens for users and clients which are in different collections using passport,because by default passport checks only for user collection,how to achieve tokens for two different collection
your article is too good and helpfull but sometime i m confused in this article
how add authentification to users 2 in the same project ,