This repository contains a sample backend code that demonstrates how to generate a Virgil JWT using the Golang SDK
Do not use this authentication in production. Requests to a /virgil-jwt endpoint must be allowed for authenticated users. Use your application authorization strategy.
Clone the repository from GitHub.
$ git clone https://github.com/VirgilSecurity/sample-backend-go.git
If you don't have an account yet, sign up for one using your e-mail.
To generate a JWT the following values are required:
Variable Name | Description |
---|---|
APP_KEY | Private key of your API key that is used to sign the JWTs. |
APP_KEY_ID | ID of your API key. A unique string value that identifies your account in the Virgil Cloud. |
APP_ID | ID of your Virgil Application. |
- open the project folder
- create a
.env
file - fill it with your account credentials (take a look at the
.env.example
file to find out how to setup your own.env
file) - save the
.env
file
To run the server go to the server example directory and run
$ set -a && source '<yourenvfile>.env' && go run main.go
Now, use your client code to make a request to get a JWT from the sample backend that is working on http://localhost:3000.
This endpoint is an example of users authentication. It takes user identity
and responds with unique token.
POST https://localhost:3000/authenticate HTTP/1.1
Content-type: application/json;
{
"identity": "string"
}
Response:
{
"authToken": "string"
}
This endpoint checks whether a user is authorized by an authorization header. It takes user's authToken
, finds related user identity and generates a virgilToken
(which is JSON Web Token) with this identity
in a payload. Use this token to make authorized api calls to Virgil Cloud.
GET https://localhost:3000/virgil-jwt HTTP/1.1
Content-type: application/json;
Authorization: Bearer <authToken>
Response:
{
"virgilToken": "string"
}
To generate JWT, you need to use the JwtGenerator
class from the SDK.
import (
"github.com/VirgilSecurity/virgil-sdk-go/v6/crypto"
"github.com/VirgilSecurity/virgil-sdk-go/v6/session"
)
cryptoInstance := &crypto.Crypto{}
cryptoPrivateKey, _ = cryptoInstance.ImportPrivateKey([]byte(os.Getenv("APP_KEY")))
[...]
tokenSigner := &session.VirgilAccessTokenSigner{}
generator := &session.JwtGenerator{
AppKey: cryptoPrivateKey,
AppKeyID: os.Getenv("APP_KEY_ID"),
AppID: os.Getenv("APP_ID"),
AccessTokenSigner: tokenSigner,
TTL: time.Hour,
}
return generator.GenerateToken(identity, nil)
Then you need to provide an HTTP endpoint which will return the JWT with the user's identity as a JSON.
For more details take a look at the main.go file.
This library is released under the 3-clause BSD License.
Our developer support team is here to help you. Find out more information on our Help Center.
You can find us on Twitter or send us email support@VirgilSecurity.com.
Also, get extra help from our support team on Slack.