2014-10-01 03:14:18 +05:30
---
layout: default
2016-03-23 18:14:53 +05:30
title: Resource owner password credentials grant
2014-10-01 03:14:18 +05:30
permalink: /authorization-server/resource-owner-password-credentials-grant/
---
2016-03-23 18:14:53 +05:30
# Resource owner password credentials grant
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
This grant is a great user experience for < u > trusted< / u > first party clients both on the web and in native applications.
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
## Flow
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
The client will ask the user for their authorization credentials (ususally a username and password).
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
The client then sends a POST request with following body parameters to the authorization server:
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
* `grant_type` with the value `password`
* `client_id` with the the client's ID
* `client_secret` with the client's secret
* `scope` with a space-delimited list of requested scope permissions.
* `username` with the user's username
* `password` with the user's password
The authorization server will respond with a JSON object containing the following properties:
2014-11-06 11:49:42 +05:30
2016-03-23 18:14:53 +05:30
* `token_type` with the value `Bearer`
* `expires_in` with an integer representing the TTL of the access token
* `access_token` a JWT signed with the authorization server's private key
* `refresh_token` an encrypted payload that can be used to refresh the access token when it expires.
## Setup
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
Wherever you initialize your objects, initialize a new instance of the authorization server and bind the storage interfaces and authorization code grant:
{% highlight php %}
// Init our repositories
$clientRepository = new ClientRepository();
$accessTokenRepository = new AccessTokenRepository();
$scopeRepository = new ScopeRepository();
$userRepository = new UserRepository();
$refreshTokenRepository = new RefreshTokenRepository();
// Path to public and private keys
2016-03-29 13:35:49 +05:30
$privateKey = 'file://path/to/private.key';
// Private key with passphrase if needed
//$privateKey = new CryptKey('file://path/to/private.key', 'passphrase');
$publicKey = 'file://path/to/public.key';
2016-03-23 18:14:53 +05:30
// Setup the authorization server
$server = new \League\OAuth2\Server\Server(
$clientRepository,
$accessTokenRepository,
$scopeRepository,
2016-03-29 13:35:49 +05:30
$privateKey,
$publicKey
2016-03-23 18:14:53 +05:30
);
// Enable the password grant on the server with an access token TTL of 1 hour
$server->enableGrantType(
new \League\OAuth2\Server\Grant\PasswordGrant(
2016-03-29 13:35:49 +05:30
$userRepository,
2016-03-23 18:14:53 +05:30
$refreshTokenRepository
),
new \DateInterval('PT1H')
);
{% endhighlight %}
2014-10-01 03:14:18 +05:30
## Implementation
The client will request an access token so create an `/access_token` endpoint.
2016-03-23 18:14:53 +05:30
{% highlight php %}
$app->post('/access_token', function (ServerRequestInterface $request, ResponseInterface $response) use ($app) {
2014-10-01 03:14:18 +05:30
2016-03-23 18:14:53 +05:30
/* @var \League\OAuth2\Server\Server $server */
$server = $app->getContainer()->get(Server::class);
2014-10-01 03:14:18 +05:30
2016-03-29 13:35:49 +05:30
// Try to respond to the request
2016-03-23 18:14:53 +05:30
try {
2016-04-10 21:34:24 +05:30
return $server->respondToAccessTokenRequest($request, $response);
2016-03-29 13:35:49 +05:30
2016-03-23 18:14:53 +05:30
} catch (\League\OAuth2\Server\Exception\OAuthServerException $exception) {
return $exception->generateHttpResponse($response);
2016-03-29 13:35:49 +05:30
2016-03-23 18:14:53 +05:30
} catch (\Exception $exception) {
$body = new Stream('php://temp', 'r+');
$body->write($exception->getMessage());
return $response->withStatus(500)->withBody($body);
2014-10-01 03:14:18 +05:30
}
});
2016-03-23 18:14:53 +05:30
{% endhighlight %}