This package provides an OAuth 2.0 client provider for integrating with an XAuthConnect authorization server. It is built to work with the popular league/oauth2-client package.
This provider allows you to easily implement the "Login with XAuthConnect" functionality in any PHP application that uses league/oauth2-client.
- OIDC Discovery: Automatically configure endpoints from a single
issuerURL. - Implements the standard Authorization Code Grant flow.
- Supports PKCE (Proof Key for Code Exchange) for enhanced security.
- Provides helper methods for XAuthConnect-specific features:
- Token Introspection (
introspectToken) - Token Revocation (
revokeToken)
- Token Introspection (
- Fully compliant with the
league/oauth2-clientAbstractProvider. - Exposes user data (
ID,Nickname) through aResourceOwnerobject.
Install the package via Composer:
composer require newlandpe/oauth2-xauthconnectThis package now requires guzzlehttp/guzzle v7.0 or greater.
If you're developing this library locally or need to use it as a path repository:
- Place this library in a directory within your project (e.g.,
oauth_libs/oauth2-xauthconnect). - Add the following to your main
composer.jsonfile:
{
"require": {
"newlandpe/oauth2-xauthconnect": "@dev"
},
"repositories": [
{
"type": "path",
"url": "./path/to/your/oauth2-xauthconnect"
}
],
"minimum-stability": "dev"
}- Run
composer updateto install the dependencies.
Follow these steps to integrate XAuthConnect into your application.
You can initialize the provider in two ways.
Provide the issuer URL of your XAuthConnect server. The provider will automatically discover all the required endpoint URLs.
Important
The issuer URL must be publicly accessible and resolvable from the environment where your application is running for OIDC discovery to succeed. If the issuer is not accessible, you must use Method 2 for manual configuration.
require_once 'vendor/autoload.php';
$provider = new ChernegaSergiy\XAuthConnect\OAuth2\Client\Provider\XAuthConnect([
'clientId' => 'your-client-id',
'clientSecret' => 'your-client-secret',
'redirectUri' => 'https://your-redirect-uri.com',
'issuer' => 'https://xauth-server.com' // Base URL of your XAuthConnect server
]);If your OIDC issuer is not publicly accessible, or if you need to specify or override specific endpoint URLs manually, you can do so by providing them in the constructor options. This method is also useful for overriding a specific endpoint URL discovered via the issuer.
The following options are available for manual configuration:
baseAuthorizationUrlbaseAccessTokenUrlresourceOwnerDetailsUrlintrospectUrlrevokeUrl
For example, if the discovery document provides a wrong token_endpoint, you can override it:
$provider = new ChernegaSergiy\XAuthConnect\OAuth2\Client\Provider\XAuthConnect([
'clientId' => 'your-client-id',
'clientSecret' => 'your-client-secret',
'redirectUri' => 'https://your-redirect-uri.com',
'issuer' => 'https://xauth-server.com', // Still recommended
// Manually override the token endpoint
'baseAccessTokenUrl' => 'httpa://new-token-url.com/token',
]);Redirect the user to the XAuthConnect server to authorize your application.
// If we don't have an authorization code then get one
if (!isset($_GET['code'])) {
// Fetch the authorization URL from the provider; this returns the
// urlAuthorize URL and generates and stores the state value in the session.
$authorizationUrl = $provider->getAuthorizationUrl();
$_SESSION['oauth2state'] = $provider->getState();
header('Location: ' . $authorizationUrl);
exit;
// Check given state against previously stored one to mitigate CSRF attack
} elseif (empty($_GET['state']) || (isset($_SESSION['oauth2state']) && $_GET['state'] !== $_SESSION['oauth2state'])) {
if (isset($_SESSION['oauth2state'])) {
unset($_SESSION['oauth2state']);
}
exit('Invalid state');
}After the user authorizes, they will be redirected back to your redirectUri with a code. Use this code to get an access token.
try {
// Try to get an access token using the authorization code grant.
$accessToken = $provider->getAccessToken('authorization_code', [
'code' => $_GET['code']
]);
// We have an access token, let's use it!
echo 'Access Token: ' . $accessToken->getToken() . "<br>";
echo 'Refresh Token: ' . $accessToken->getRefreshToken() . "<br>";
echo 'Expired in: ' . $accessToken->getExpires() . "<br>";
echo 'Already expired? ' . ($accessToken->hasExpired() ? 'Yes' : 'No') . "<br>";
} catch (\League\OAuth2\Client\Provider\Exception\IdentityProviderException $e) {
// Failed to get the access token or user details.
exit($e->getMessage());
}With the access token, you can now fetch the user's profile information.
try {
// Returns a XAuthConnectUser instance.
$user = $provider->getResourceOwner($accessToken);
printf('Hello, %s!', $user->getNickname());
echo 'Your UUID is: ' . $user->getId();
// Get all user data as an array.
var_dump($user->toArray());
} catch (Exception $e) {
// Failed to get user details
exit('Oh dear...');
}This provider includes methods for XAuthConnect-specific endpoints.
You can check if a token is active and view its metadata.
$introspectionResult = $provider->introspectToken($accessToken->getToken());
if ($introspectionResult['active']) {
echo "Token is active.\n";
echo "Expires at: " . date('Y-m-d H:i:s', $introspectionResult['exp']);
} else {
echo "Token is not active.";
}You can invalidate an access or refresh token on the server.
// Revoke the access token
$provider->revokeToken($accessToken->getToken());
// Revoke the refresh token
$provider->revokeToken($accessToken->getRefreshToken());
echo "Tokens have been revoked.";Contributions are welcome and appreciated! Here's how you can contribute:
- Fork the project on GitHub.
- Create your feature branch (
git checkout -b feature/AmazingFeature). - Commit your changes (
git commit -m 'Add some AmazingFeature'). - Push to the branch (
git push origin feature/AmazingFeature). - Open a Pull Request.
Please make sure to update tests as appropriate and adhere to the existing coding style.
This library is licensed under the CSSM Unlimited License v2.0 (CSSM-ULv2). See the LICENSE file for details.