React SPA Sample App

CyberArk Identity JS SDK capabilities demonstration with React SPA

This Sample Application showcases the capabilities of CyberArk Identity Widget linked with an OpenID connect application and includes an OpenID Connect playground with all possible grant flows. This app uses React JS as the frontend.

CyberArk Identity Tenant Configuration

If you don't have any existing CyberArk tenants, you can try a free trial tenant [here]. (https://www.idaptive.com/free-trial)

Step 1: Create a role

  • To create a role refer here.
  • Ensure that User Management, Role Management Rights are added to the role under the Administrative Rights section.

Step 2: Setup an Authentication Profile

  • Set up an Authentication profile and add it to the policy under the Authentication Policies section. For more information, refer to here.

Step 3: Create a Policy

  • To create a policy, refer here.
  • Ensure that the above-created role is added to the policy.

Step 4: Setup an OpenID Connect Application

  1. Navigate to the CyberArk Admin portal and click Web Apps under the Apps section.
333
  1. Click Add Web Apps and navigate to the Custom section->Add OpenID Connect app.
  2. Open the OpenID Connect app created in the above step.
  3. In the Settings section, add an ID of your choice for the Application ID.
  4. Navigate to Trust Section

    Enter client secret (E.g.: $3CrE!4327)

    • Add Resource application URL for the sample app.
http://localhost:3000/Resource
  1. Add the Redirect destinations for the sample app.
http://localhost:3000/RedirectResource

Based on your app configuration the URL configuration should be changed.

948
  • Setup Permissions for OpenID Connect.
    * Add the above-created role and provide Run permission to generate Tokens.
1150

For more Information on OpenID Connect, refer to here .

Specify Trusted DNS Domains for API Calls

📘

Administrator privileges

To add a trusted domain, you require administrator privileges.

  • Include Web App Domain in Trusted DNS Domains for API Calls.
    • Navigate to Settings -> Authentication -> Security Settings -> API Security in the admin portal.
    • Add an entry under Trusted DNS Domains for API Calls.
localhost

Step 5: Create an Authentication Widget and configure it as follows.

React SPA Deployment Guide

A step-by-step guide to setting up a sample app environment

Overview

This guide will help you install the prerequisite tools and deploy the React SPA sample app.

Before you begin

Install NODE.js

  • Download the Node.js installer from https://nodejs.org/en/download/ and run the file(highly recommended to download 64-bit version).
  • Node.js installer includes the NPM package manager.
  • Ensure that the path of Node.js is configured into the system PATH environment variable.
  • Use the commands below to check Node.js installation.
  • Minimum version of node required is 16.15.0.
node -v
npm -v

Install JS SDK

  • Install the JavaScript SDK from here

Run

Run the application

npm install
npm start

Explore Sign Up and Sign In widget

Using the widget, the customer application will embed to the existing customer web application to perform the user authentication instead of regular redirection.

Introduction to Sign Up / Sign In Widget
CyberArk provides a widget that customers can use to avail of the sign-up and sign-in capabilities in their applications.
The Sign Up / Sign In widget can be integrated into a custom application where the organization can authenticate end-users identities using CyberArk Identity.

Widget overview

  • User can register an account with the CyberArk Identity server.
  • Admin needs to map the role in the CyberArk Admin portal for newly registered users.
  • User will authenticate to CyberArk Identity server.

Widget Usage

  • The Sign Up/ Sign In widget in the sample web app secures their end-user registration and authentication using CyberArk Sign Up/Sign In widget, respectively.
624 624
  • On clicking the Get Started button of the widget's card, it should navigate to the login protocols page. On clicking the Login button from the login protocols page, it has a Sign Up / Sign In widget.

Widget Exploration

1861
  • On the click of the Sign Up button, the CyberArk Identity Sign Up widget will appear. Users will be able to register and create an account.
624
  • Post creation of the user, the Sign In widget appears through which the user can sign in to the sample app.
1862
  • The authentication challenges appear when clicked on the Next button, responding to which the user authenticates.

📘

Note:

We use OAuth Authorization with PKCE flow to get an access token upon successful response. Use the access token in the authorization header for subsequent requests in a sample application.

User Info

After successful authentication using the widget, the user will navigate to the "user info" page, where the user can explore additional functionalities provided.

624

Update Profile

Update Profile page contains the current user account details and provides an option to update the profile information. The profile information includes username, email address, display name, and mobile number. The user can edit the details and click on the update button to submit the details.
Updating the user profile invokes the /user/UpdateProfile endpoint, which updates the cloud user properties.

1592

After the successful update, a success popup gets displayed on the same screen.

Explore OIDC flows

Using the OpenID Connect Web application connected with the widget we used above for login, we can explore the following OIDC flows.

  • Authorization
  • Implicit
  • Hybrid

📘

Note

As part of Authorized Redirect URIs of the OpenID Connect web application have "http://localhost:3000/redirect".

Each flow explanation as follows.

Authorization code flow

When configuring public applications, such as mobile apps or single-page apps, where the client secret is not secure, this flow helps removes the use of client secret, making it more secure.

The following section provides more details about Authorization code flow in React Sample App.

  1. Select Authorization from the drop-down and click Build Authorize URL.
1886
  1. The generated authorization URL is hit on click of Authorize after taking access permissions of the scopes requested (which were set up on the settings page).
  2. The authorization code is sent with a preview of the Token Endpoint API.
1876
  1. On click of Proceed, Token set and Claims are fetched using the access_token.
1848
  1. Try Another Flow performs the logout against the user and navigates to the home page of the sample app.

Implicit flow

This flow is the simplest and is typically used by JavaScript applications running in a browser. The access token under this flow is assumed to be used temporarily. By default, id_token is selected as response_type; if the token is also chosen, the response contains access_token along with id_token.

The following section provides more details about Implicit code flow in React Sample App.

  1. Select Implicit from the drop-down and check the token box to get it as the response.
  2. Click the Build Authorize URL to get the URL as in the previous flow with the response types.
1858
  1. On click of Authorize, the authorize response is returned with the access_token.
1866
  1. On click of Proceed, we get the Claims information.
  2. Try Another Flow performs the logout against the user and navigates to the home page of the sample app.

Hybrid flow

Hybrid flow is the combination of Authorization code and Implicit flow.

The following section provides more details about Hybrid code flow in React Sample App.

  1. Select Hybrid from the dropdown and choose the response types for additional information in the response and click on Build Authorize URL.
1839
  1. On Authorize action, we get the Authorize Response and the preview of the Token Endpoint.
1858
  1. On Proceed button click, we get a similar response as the Authorization code flow with Token set and Claims.
  2. Try Another Flow performs the logout against the user and navigates to the home page of the sample app.

Introspect

Creates a request to validate the JWT or opaque token by calling introspect endpoint.
Set the clientId and clientSecret for authorization and pass token as a parameter.

856

On click of the Introspect button, we will get the Introspect response containing the active status as true or false.

871