The version 1.x of the PHP SDK now works with the Auth API v2 which adds lots of new features and changes.
- Now, all the SDK is under the namespace
\Auth0\SDK
- The exceptions were moved to the namespace
\Auth0\SDK\Exceptions
- The method
Auth0::getUserInfo
is deprecated and soon to be removed. We encourage to useAuth0::getUser
to enforce the adoption of the API v2
- The Auth0 class, now provides two methods to access the user metadata,
getUserMetadata
andgetAppMetadata
. For more info, check the API v2 changes - The Auth0 class, now provides a way to update the UserMetadata with the method
updateUserMetadata
. Internally, it uses the update user endpoint, check the method documentation for more info. - The new service
\Auth0\SDK\API\ApiUsers
provides an easy way to consume the API v2 Users endpoints. - A simple API client (
\Auth0\SDK\API\ApiClient
) is also available to use. - A JWT generator and decoder is also available (
\Auth0\SDK\Auth0JWT
)
Note: API V2 restrict the access to the endpoints via scopes. By default, the user token has granted certain scopes that let update the user metadata but not the root attributes nor app_metadata. To update this information and access another endpoints, you need an special token with this scopes granted. For more information about scopes, check the API v2 docs.
Check the basic-oauth example to see a quick demo on how the sdk works.
You just need to create a .env
file with the following information:
AUTH0_CLIENT_SECRET=YOUR_APP_SECRET
AUTH0_CLIENT_ID=YOU_APP_CLIENT
AUTH0_DOMAIN=YOUR_DOMAIN.auth0.com
AUTH0_CALLBACK_URL=http://localhost:3000/index.php
AUTH0_APPTOKEN=A_VALID_APPTOKEN_WITH_CREATE_USER_SCOPE
You will get your app client and secret from your Auth0 app you had created.
The auth0 domain, is the one you pick when you created your auth0 account.
You need to set this callback url in your app allowed callbacks.
The app token is used in the 'create user' page and needs create:users
scope. To create one, you need to use the token generator in the API V2 documentation page
To run the example, you need composer (the PHP package manager) installed (you can find more info about composer here) and run the following commands on the same folder than the code.
$ composer install
$ php -S localhost:3000
- First is important to read the API v2 changes document to catch up the latest changes to the API.
- Update your composer.json file.
- change the version "auth0/auth0-php": "~1.0"
- add the new dependency "firebase/php-jwt" : "dev-master"
- Now the SDK is PSR-4 compliant so you will need to change the namespaces (sorry :( ) to
\Auth0\SDK
- The method
getUserInfo
is deprecated and candidate to be removed on the next release. UsergetUser
instead.getUser
returns an User object compliant with API v2 which is astdClass
(check the schema here)
We recommend using Composer to install the library.
Modify your composer.json
to add the following dependencies and run composer update
.
{
"require": {
"auth0/auth0-php": "~1.0",
}
}
Create a php page (or action if you are using an MVC framework) that will handle the callback from the login attempt.
In there, you should create an instance of the SDK with the proper configuration and ask for the user information.
use Auth0SDK\Auth0;
$auth0 = new Auth0(array(
'domain' => 'YOUR_AUTH0_DOMAIN',
'client_id' => 'YOUR_AUTH0_CLIENT_ID',
'client_secret' => 'YOUR_AUTH0_CLIENT_SECRET',
'redirect_uri' => 'http://<name>/callback.php'
));
$userInfo = $auth0->getUser();
If the user was already logged in, getUser()
will retrieve that user information from the PHP Session
. If not, it will try to exchange the code given to the callback to get an access token, id token and the user information from auth0.
This makes it possible to use the same code in the callback action and any other page, so to see if there is a logged in user, you can call
// ...
// code from above
if (!$userInfo) {
// print login button
} else {
// Say hello to $userInfo['name']
// print logout button
}
After authenticating the user on Auth0, we will do a GET to a URL on your web site. For security purposes, you have to register this URL on the Application Settings section on Auth0 Admin app.
http://<name>/callback.php
### 4. Triggering login manually or integrating the Auth0 widget
You can trigger the login in different ways, like redirecting to a login link or using Lock, by adding the following javascript into your page
<button onclick="login()">Login</button>
<script src="https://cdn.auth0.com/js/lock-7.min.js"></script>
<script type="text/javascript">
var lock = new Auth0Lock(AUTH0_CLIENT_ID, AUTH0_DOMAIN);
function login() {
lock.show({
callbackURL: AUTH0_CALLBACK_URL
, responseType: 'code'
, authParams: {
scope: 'openid profile'
}
});
}
</script>
By default, the SDK will store the user information in the PHP Session
and it will discard the access token and the id token. If you like to persist them as well, you can pass 'persist_access_token' => true
and 'persist_id_token' => true
to the SDK configuration in step 2. You can also disable session all together by passing 'store' => false
.
If you want to change PHP Session
and use Laravel, Zend, Symfony or other abstraction to the session, you can create a class that implements get
, set
, delete
and pass it to the SDK as following.
$laravelStore = new MyLaravelStore();
$auth0 = new Auth0(array(
// ...
'store' => $laravelStore,
// ...
));
This SDK uses Composer to manage its dependencies.
php composer.phar install
- Install dependencies
- Start your web server on
examples/{example-name}
folder. - Create an OpenID Connect Application on Auth0.
- Configure the callback url to point
{your-base-url}\callback.php
. - Open
examples/{example-name}/config.php
and replace all placeholder parameters. - On your browser, open the Auth0 example project. Make sure
index.php
is being loaded.
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
This project is licensed under the MIT license. See the LICENSE file for more info.
- Better code documentation
- Better user guide
- Create an interface for the store
- Drink coffee