Create JSON Web Token Authentication in WordPress.
WordPress JSON Web Token Authentication allows you to do REST API authentication via token. It is a simple, non-complex, and easy to use. This plugin probably is the most convenient way to do JWT Authentication in WordPress.
When updating from v2 to v3, familiarise yourself with its changes to ensure that your site continues to work as expected:
Key changes:
jwt_auth_expire
.Key changes:
jwt_auth_whitelist
. You can remove the hook.Most shared hosts have disabled the HTTP Authorization Header by default.
To enable this option you’ll need to edit your .htaccess file by adding the following:
RewriteEngine on RewriteCond %{HTTP:Authorization} ^(.*) RewriteRule ^(.*) - [E=HTTP_AUTHORIZATION:%1]
To enable this option you’ll need to edit your .htaccess file by adding the following (see this issue):
SetEnvIf Authorization "(.*)" HTTP_AUTHORIZATION=$1
The JWT needs a secret key to sign the token. This secret key must be unique and never be revealed.
To add the secret key, edit your wp-config.php file and add a new constant called JWT_AUTH_SECRET_KEY.
define('JWT_AUTH_SECRET_KEY', 'your-top-secret-key');
You can use a string from here
This plugin has the option to activate CORs support.
To enable the CORs Support edit your wp-config.php file and add a new constant called JWT_AUTH_CORS_ENABLE
define('JWT_AUTH_CORS_ENABLE', true);
When the plugin is activated, a new namespace is added.
/jwt-auth/v1
Also, three new POST endpoints are added to this namespace.
/wp-json/jwt-auth/v1/token /wp-json/jwt-auth/v1/token/validate /wp-json/jwt-auth/v1/token/refresh
/wp-json/jwt-auth/v1/token
To generate token, submit a POST request to this endpoint. With username
and password
as the parameters.
It will validates the user credentials, and returns success response including a token if the authentication is correct or returns an error response if the authentication is failed.
You can use the optional parameter device
with the device identifier to let user manage the device access in your profile. If this parameter is empty, it is ignored.
{ "success": true, "statusCode": 200, "code": "jwt_auth_valid_credential", "message": "Credential is valid", "data": { "token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczpcL1wvcG9pbnRzLmNvdXZlZS5jby5pZCIsImlhdCI6MTU4ODQ5OTE0OSwibmJmIjoxNTg4NDk5MTQ5LCJleHAiOjE1ODkxMDM5NDksImRhdGEiOnsidXNlciI6eyJpZCI6MX19fQ.w3pf5PslhviHohmiGF-JlPZV00XWE9c2MfvBK7Su9Fw", "id": 1, "email": "[email protected]", "nicename": "contactjavas", "firstName": "Bagus Javas", "lastName": "Heruyanto", "displayName": "contactjavas" } }
{ "success": false, "statusCode": 403, "code": "invalid_username", "message": "Unknown username. Try again or check your email address.", "data": [] }
Once you get the token, you must store it somewhere in your application. It can be:
– using cookie
– or using localstorage
– or using a wrapper like localForage or PouchDB
– or using local database like SQLite or Hive
– or your choice based on app you develop 😉
Then you should pass this token as Bearer Authentication header to every API call. The header format is:
Authorization: Bearer your-generated-token
and here’s an example:
"Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczpcL1wvcG9pbnRzLmNvdXZlZS5jby5pZCIsImlhdCI6MTU4ODQ5OTE0OSwibmJmIjoxNTg4NDk5MTQ5LCJleHAiOjE1ODkxMDM5NDksImRhdGEiOnsidXNlciI6eyJpZCI6MX19fQ.w3pf5PslhviHohmiGF-JlPZV00XWE9c2MfvBK7Su9Fw";
The jwt-auth will intercept every call to the server and will look for the authorization header, if the authorization header is present, it will try to decode the token and will set the user according with the data stored in it.
If the token is valid, the API call flow will continue as always.
You likely don’t need to validate the token your self. The plugin handle it for you like explained above.
But if you want to test or validate the token manually, then send a POST request to this endpoint (don’t forget to set your Bearer Authorization header):
/wp-json/jwt-auth/v1/token/validate
{ "success": true, "statusCode": 200, "code": "jwt_auth_valid_token", "message": "Token is valid", "data": [] }
For security reasons, third-party applications that are integrating with your authentication server will not store the user’s username and password. Instead they will store the refresh token in a user-specific storage that is only accessible for the user. The refresh token can be used to re-authenticate as the same user and generate a new access token.
When authenticating with username
and password
as the parameters to /wp-json/jwt-auth/v1/token
, a refresh token is sent as a cookie in the response.
/wp-json/jwt-auth/v1/token
To generate new access token using the refresh token, submit a POST request to the token endpoint together with the refresh_token
cookie.
Use the optional parameter device
with the device identifier to associate the token with that device.
If the refresh token is valid, then you receive a new access token in the response.
By default, each access token expires after 10 minutes.
/wp-json/jwt-auth/v1/token/refresh
To generate new refresh token using the refresh token, submit a POST request to the token refresh endpoint together with the refresh_token
cookie.
Use the optional parameter device
with the device identifier to associate the refresh token with that device.
If the refresh token is valid, then you receive a new refresh token as a cookie in the response.
By default, each refresh token expires after 30 days.
Whenever you are authenticating afresh or refreshing the refresh token, only the last issued refresh token remains valid. All previously issued refresh tokens can no longer be used.
This means that a refresh token cannot be shared. To allow multiple devices to authenticate in parallel without losing access after another device re-authenticated, use the parameter device
with the device identifier to associate the refresh token only with that device.
curl -F device="abc-def" -F username=myuser -F password=mypass /wp-json/jwt-auth/v1/token curl -F device="abc-def" -b "refresh_token=123.abcdef..." /wp-json/jwt-auth/v1/token curl -F device="abc-def" -b "refresh_token=123.abcdef..." /wp-json/jwt-auth/v1/token/refresh
If the token is invalid an error will be returned. Here are some samples of errors:
{ "success": false, "statusCode": 403, "code": "jwt_auth_bad_config", "message": "JWT is not configured properly.", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_no_auth_header", "message": "Authorization header not found.", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_bad_iss", "message": "The iss do not match with this server.", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_invalid_token", "message": "Signature verification failed", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_bad_request", "message": "User ID not found in the token.", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_user_not_found", "message": "User doesn't exist", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_invalid_token", "message": "Expired token", "data": [] }
{ "success": false, "statusCode": 403, "code": "jwt_auth_obsolete_token", "message": "Token is obsolete", "data": [] }
{ "success": false, "statusCode": 401, "code": "jwt_auth_invalid_refresh_token", "message": "Invalid refresh token", "data": [] }
{ "success": false, "statusCode": 401, "code": "jwt_auth_obsolete_refresh_token", "message": "Refresh token is obsolete", "data": [] }
{ "success": false, "statusCode": 401, "code": "jwt_auth_expired_refresh_token", "message": "Refresh token has expired", "data": [] }
JWT Auth is developer friendly and has some filters available to override the default settings.
The jwt_auth_cors_allow_headers
allows you to modify the available headers when the CORs support is enabled.
Default Value:
'X-Requested-With, Content-Type, Accept, Origin, Authorization'
Usage example:
/** * Change the allowed CORS headers. * * @param string $headers The allowed headers. * @return string The allowed headers. */ add_filter( 'jwt_auth_cors_allow_headers', function ( $headers ) { // Modify the headers here. return $headers; } );
The jwt_auth_iss allows you to change the iss value before the payload is encoded to be a token.
Default Value:
get_bloginfo( 'url' )
Usage example:
/** * Change the token issuer. * * @param string $iss The token issuer. * @return string The token issuer. */ add_filter( 'jwt_auth_iss', function ( $iss ) { // Modify the "iss" here. return $iss; } );
The jwt_auth_not_before
allows you to change the nbf value before the payload is encoded to be a token.
Default Value:
// Creation time. time()
Usage example:
/** * Change the token's nbf value. * * @param int $not_before The default "nbf" value in timestamp. * @param int $issued_at The "iat" value in timestamp. * * @return int The "nbf" value. */ add_filter( 'jwt_auth_not_before', function ( $not_before, $issued_at ) { // Modify the "not_before" here. return $not_before; }, 10, 2 );
The jwt_auth_expire
allows you to change the value exp before the payload is encoded to be a token.
Default Value:
time() + (DAY_IN_SECONDS * 7)
Usage example:
/** * Change the token's expire value. * * @param int $expire The default "exp" value in timestamp. * @param int $issued_at The "iat" value in timestamp. * * @return int The "nbf" value. */ add_filter( 'jwt_auth_expire', function ( $expire, $issued_at ) { // Modify the "expire" here. return $expire; }, 10, 2 );
The jwt_auth_refresh_expire
filter hook allows you to change the expiration date of the refresh token.
Default Value:
time() + (DAY_IN_SECONDS * 30)
Usage example:
/** * Change the refresh token's expiration time. * * @param int $expire The default expiration timestamp. * @param int $issued_at The current time. * * @return int The custom refresh token expiration timestamp. */ add_filter( 'jwt_auth_refresh_expire', function ( $expire, $issued_at ) { // Modify the "expire" here. return $expire; }, 10, 2 );
The jwt_auth_alg
allows you to change the supported signing algorithm for your application.
Default Value:
'HS256'
Usage example:
/** * Change the token's signing algorithm. * * @param string $alg The default supported signing algorithm. * @return string The supported signing algorithm. */ add_filter( 'jwt_auth_alg', function ( $alg ) { // Change the signing algorithm here. return $alg; } );
The jwt_auth_payload
allows you to modify all the payload / token data before being encoded and signed.
Default value:
<?php $token = array( 'iss' => get_bloginfo('url'), 'iat' => $issued_at, 'nbf' => $not_before, 'exp' => $expire, 'data' => array( 'user' => array( 'id' => $user->ID, ) ) );
Usage example:
/** * Modify the payload/ token's data before being encoded & signed. * * @param array $payload The default payload * @param WP_User $user The authenticated user. * . * @return array The payload/ token's data. */ add_filter( 'jwt_auth_payload', function ( $payload, $user ) { // Modify the payload here. return $payload; }, 10, 2 );
The jwt_auth_valid_credential_response
allows you to modify the valid credential response when generating a token.
Default value:
<?php $response = array( 'success' => true, 'statusCode' => 200, 'code' => 'jwt_auth_valid_credential', 'message' => __( 'Credential is valid', 'jwt-auth' ), 'data' => array( 'token' => $token, 'id' => $user->ID, 'email' => $user->user_email, 'nicename' => $user->user_nicename, 'firstName' => $user->first_name, 'lastName' => $user->last_name, 'displayName' => $user->display_name, ), );
Usage example:
/** * Modify the response of valid credential. * * @param array $response The default valid credential response. * @param WP_User $user The authenticated user. * . * @return array The valid credential response. */ add_filter( 'jwt_auth_valid_credential_response', function ( $response, $user ) { // Modify the response here. return $response; }, 10, 2 );
The jwt_auth_valid_token_response allows you to modify the valid token response when validating a token.
Default value:
<?php $response = array( 'success' => true, 'statusCode' => 200, 'code' => 'jwt_auth_valid_token', 'message' => __( 'Token is valid', 'jwt-auth' ), 'data' => array(), );
Usage example:
/** * Modify the response of valid token. * * @param array $response The default valid token response. * @param WP_User $user The authenticated user. * @param string $token The raw token. * @param array $payload The token data. * . * @return array The valid token response. */ add_filter( 'jwt_auth_valid_token_response', function ( $response, $user, $token, $payload ) { // Modify the response here. return $response; }, 10, 4 );
The jwt_auth_extra_token_check allows you to add extra criterias to validate the token. If empty, has no problem to proceed. Use empty value to bypass the filter. Any other value will block the token access and returns response with code jwt_auth_obsolete_token
.
Default value:
''
Usage example:
/** * Modify the validation of token. No-empty values block token validation. * * @param array $response An empty value ''. * @param WP_User $user The authenticated user. * @param string $token The raw token. * @param array $payload The token data. * . * @return array The valid token response. */ add_filter( 'jwt_auth_extra_token_check', function ( $response, $user, $token, $payload ) { // Modify the response here. return $response; }, 10, 4 );
PHP-JWT from firebase
JWT Authentication for WP REST API
Devices utility by pesseba
The awesome maintainers and contributors
Enable PHP HTTP Authorization Header
Most shared hosts have disabled the HTTP Authorization Header by default.
To enable this option you’ll need to edit your .htaccess file by adding the following:
RewriteEngine on RewriteCond %{HTTP:Authorization} ^(.*) RewriteRule ^(.*) - [E=HTTP_AUTHORIZATION:%1]
To enable this option you’ll need to edit your .htaccess file by adding the following (see this issue):
SetEnvIf Authorization "(.*)" HTTP_AUTHORIZATION=$1
Configuration
The JWT needs a secret key to sign the token. It must be unique and never be revealed.
To add the secret key, edit your wp-config.php file and add a new constant called JWT_AUTH_SECRET_KEY.
define('JWT_AUTH_SECRET_KEY', 'your-top-secret-key');
You can use a string from here
This plugin has the option to enable CORs support.
To enable the CORs Support edit your wp-config.php file and add a new constant called JWT_AUTH_CORS_ENABLE
define('JWT_AUTH_CORS_ENABLE', true);
Finally activate the plugin within the plugin dashboard.
You can visit the GitHub repository here
You can help this plugin stay alive and maintained by giving 5 Stars Rating/ Review or donating me via:
– PayPal
jwt_auth_valid_token_extra
filter to jwt_auth_extra_token_check
. Please check if you use this filter.jwt_auth_default_whitelist
to prevent error when visiting WordPress admin area.jwt_auth_whitelist
usage.permission_callback
argument since it’s required in WP 5.5/wp-json/wp/v2/*
whitelisting didn’t work. It should be /wp-json/wp/v2/
(without the star char)./wp-json/wp/v2/*
by default. This will prevent the plugin from breaking the default WordPress administration (gutenberg, etc).jwt_auth_valid_token_response
should only filter the $response array instead of the whole WP_REST_Response
. Please check if you use this filter 🙂jwt_auth_whitelist
filter usage. That filter should be added directly (without hook) OR inside plugins_loaded
. Adding it to init
(or after that) will not work.jwt_auth_default_whitelist
filter./wp-json/wc/
and /wp-json/wc-auth/
namespace. You can use jwt_auth_whitelist
filter if you want to whiteist other endpoints. See Whitelisting Endpoints section in the description tab.jwt_auth_token_payload
filter to jwt_auth_payload
jwt_auth_token_response
filter to jwt_auth_valid_credential_response
jwt_auth_valid_token_response
jwt_auth_whitelist
filter.jwt_auth_iss
filter.jwt_auth_alg
filter.jwt_auth_valid_token_response
filter.jwt_auth_do_custom_auth
filter so that developer can use custom authentication like OTP authentication or any other.