Gathering detailed insights and metrics for passport-keycloak-bearer
Gathering detailed insights and metrics for passport-keycloak-bearer
Gathering detailed insights and metrics for passport-keycloak-bearer
Gathering detailed insights and metrics for passport-keycloak-bearer
HTTP Bearer authentication strategy for Passport and Keycloak
npm install passport-keycloak-bearer
Typescript
Module System
Min. Node Version
Node Version
NPM Version
82.7
Supply Chain
98
Quality
74.7
Maintenance
100
Vulnerability
98.2
License
JavaScript (100%)
Total Downloads
838,668
Last Day
94
Last Week
5,840
Last Month
32,320
Last Year
391,008
MIT License
33 Stars
95 Commits
5 Forks
1 Watchers
2 Branches
5 Contributors
Updated on Apr 03, 2025
Minified
Minified + Gzipped
Latest Version
2.4.1
Package Id
passport-keycloak-bearer@2.4.1
Unpacked Size
16.91 kB
Size
5.99 kB
File Count
10
NPM Version
8.15.1
Node Version
21.6.0
Published on
Oct 04, 2024
Cumulative downloads
Total Downloads
Last Day
-6.9%
94
Compared to previous day
Last Week
-28.4%
5,840
Compared to previous week
Last Month
8.3%
32,320
Compared to previous month
Last Year
72.3%
391,008
Compared to previous year
HTTP Bearer authentication strategy for Passport and Keycloak.
This module lets you authenticate HTTP requests using bearer tokens with a Keycloak authority in your Node.js applications. Bearer tokens are typically used protect API endpoints, and are often issued using OAuth 2.0.
By plugging into Passport, bearer token support can be easily and unobtrusively integrated into any application or framework that supports Connect-style middleware, including Express.
$ npm install passport-keycloak-bearer
KeycloakBearerStrategy uses Bearer Token protocol to protect web resource/api. It works in the following manner:
User sends a request to the protected web api which contains an access_token in either the authorization header or body. Passport extracts and validates the access_token, and propagates the claims in access_token to the verify
callback and let the framework finish the remaining authentication procedure.
On successful authentication, passport adds the user information to req.user
and passes it to the next middleware, which is usually the business logic of the web resource/api. In case of error, passport sends back an unauthorized response.
1 import KeycloakBearerStrategy from 'passport-keycloak-bearer' 2 ... 3 // new KeycloakBearerStrategy(options, verify) 4 passport.use(new KeycloakBearerStrategy(({ 5 "realm": "master", 6 "url": "https://keycloak.dev.com/auth" 7 }, (jwtPayload, done) => { 8 const user = doSomethingWithUser(jwtPayload); 9 return done(null, user); 10 }));
The JWT authentication strategy is constructed as follows:
new KeycloakBearerStrategy(options, verify)
url
(Required)
Keycloak auth url. For instance: https://keycloak.dev.org/auth.
realm
(Required)
Your realm.
passReqToCallback
(Optional - Default: false)
Whether you want to use req
as the first parameter in the verify callback. See section 5.1.1.3 for more details.
loggingLevel
(Optional - Default: 'warn')
Logging level. 'debug', 'info', 'warn' or 'error'.
customLogger
(Optional)
Custom logging instance. It must be able to log the following types: 'debug', 'info', 'warn' and 'error'.
issuer
(Optional)
If defined the token issuer (iss) will be verified against this value.
audience
(Optional)
If defined, the token audience (aud) will be verified against this value.
algorithms
(Optional - Default: ['HS256'])
List of strings with the names of the allowed algorithms. For instance, ["HS256", "HS384"].
ignoreExpiration
(Optional)
If true do not validate the expiration of the token.
jwtFromRequest
(Optional)
This value can be set according passport-jwt if this options is not used, passport-keycloak-bearer will obtain jwt from http header Auth as a Bearer token.
jsonWebTokenOptions
(Optional)
passport-keycloak-bearer is verifying the token using jsonwebtoken. Pass here an options object for any other option you can pass the jsonwebtoken verifier. (i.e maxAge)
verify
is a function with the parameters verify(jwtPayload, done)
jwtPayload
is an object literal containing the decoded JWT payload.done
is a passport error first callback accepting arguments
done(error, user, info)Use passport.authenticate()
, specifying the 'keycloak'
strategy, to
authenticate requests. Requests containing bearer verified do not require session support, so the session
option can be set to false
.
For example, as route middleware in an Express application:
1app.get( 2 '/path', 3 passport.authenticate('keycloak', { session: false }), 4 function(req, res) { 5 res.json(req.user); 6 } 7);
Submit an issue
Contribute usage docs
Simen Haugerud Granlund © 2018
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
Found 5/11 approved changesets -- score normalized to 4
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
10 existing vulnerabilities detected
Details
Score
Last Scanned on 2025-06-23
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More