Chilkat Examples

ChilkatHOME.NET Core C#Android™AutoItCC#C++Chilkat2-PythonCkPythonClassic ASPDataFlexDelphi ActiveXDelphi DLLGoJavaLianjaMono C#Node.jsObjective-CPHP ActiveXPHP ExtensionPerlPowerBuilderPowerShellPureBasicRubySQL ServerSwift 2Swift 3,4,5...TclUnicode CUnicode C++VB.NETVBScriptVisual Basic 6.0Visual FoxProXojo Plugin

C Web API Examples

Primary Categories

ABN AMRO
AWS Secrets Manager
AWS Security Token Service
AWS Translate
Activix CRM
Adyen
Alibaba Cloud OSS
Amazon Cognito
Amazon DynamoDB
Amazon MWS
Amazon Pay
Amazon Rekognition
Amazon SP-API
Amazon Voice ID
Aruba Fatturazione
Azure Maps
Azure Monitor
Azure OAuth2
Azure Storage Accounts
Backblaze S3
Banco Inter
Belgian eHealth Platform
Bitfinex v2 REST
Bluzone
BrickLink
Bunny CDN
CallRail
CardConnect
Cerved
ClickBank
Clickatell
Cloudfare
Constant Contact
DocuSign
Duo Auth MFA
ETrade
Ecwid
Egypt ITIDA
Egypt eReceipt
Etsy
Facebook
Faire
Frame.io
GeoOp
GetHarvest
Global Payments
Google People
Google Search Console
Google Translate
Hungary NAV Invoicing
IBM Text to Speech
Ibanity
IntakeQ
Jira
Lightspeed
MYOB
Magento
Mailgun
Mastercard

MedTunnel
MercadoLibre
MessageMedia
Microsoft Calendar
Microsoft Group
Microsoft Tasks and Plans
Microsoft Teams
Moody's
Okta OAuth/OIDC
OneLogin OIDC
OneNote
OpenAI ChatGPT
PRODA
PayPal
Paynow.pl
Peoplevox
Populi
QuickBooks
Rabobank
Refinitiv
Royal Mail OBA
SCiS Schools Catalogue
SII Chile
SMSAPI
SOAP finkok.com
SendGrid
Shippo
Shopify
Shopware
Shopware 6
SimpleTexting
Square
Stripe
SugarCRM
TicketBAI
Trello
Twilio
Twitter API v2
Twitter v1
UPS
UniPin
VoiceBase
Vonage
WaTrend
Walmart v3
Wasabi
WhatsApp
WiX
WooCommerce
WordPress
Xero
Yahoo Mail
Yapily
Yousign
ZATCA
Zendesk
Zoom
_Miscellaneous_
eBay
effectconnect
hacienda.go.cr

 

 

 

(C) Verify Okta ID Token Locally

This example demonstrates how to validate an Okta ID token using Chilkat's JWT class.

For more information, see https://developer.okta.com/docs/guides/validate-id-tokens/overview/

Chilkat C/C++ Library Downloads

MS Visual C/C++

Linux/CentOS C/C++

Alpine Linux C/C++

MAC OS X C/C++

armhf/aarch64 C/C++

C++ Builder

iOS C/C++

Android C/C++

Solaris C/C++

MinGW C/C++

#include <C_CkJsonObject.h>
#include <C_CkJwt.h>
#include <C_CkStringBuilder.h>
#include <C_CkPublicKey.h>
#include <C_CkDateTime.h>

void ChilkatSample(void)
    {
    HCkJsonObject jsonToken;
    BOOL success;
    HCkJsonObject jsonWebKeys;
    HCkJwt jwt;
    const char *idToken;
    const char *joseHeader;
    HCkJsonObject json;
    const char *kid;
    HCkStringBuilder sbKid;
    const char *e;
    const char *n;
    int i;
    int count_i;
    BOOL bFound;
    int iMatch;
    HCkPublicKey pubkey;
    HCkJsonObject jsonWebKey;
    BOOL bVerified;
    const char *claims;
    HCkJsonObject jsonClaims;
    HCkDateTime dtExp;
    BOOL bExpired;

    // This example assumes the Chilkat API to have been previously unlocked.
    // See Global Unlock Sample for sample code.

    // This example begins with two JSON files:
    // 
    // 1. The access + id token obtained from Okta as shown in one fo these examples:  
    //    Get Okta Token using Resource Owner Password Flow
    // 
    // 2. The Okta web keys obtained by this example:  Get Okta Web Keys
    // 
    // 

    // ----------------------------------------------------------------
    // Note: The very last step of this example is where the claims, such as iss, aud, iat, exp, and nonce
    // are extracted from the ID token and examined.
    // ----------------------------------------------------------------

    // Load the access/id token to be verified.
    // It contains JSON that looks like this:
    // {
    //   "access_token": "eyJraWQiOiJhb ... O_eVu-kBp6g",
    //   "token_type": "Bearer",
    //   "expires_in": 3600,
    //   "scope": "openid",
    //   "id_token": "eyJraWQi ... FrL9WOuwbQtUg"
    // }
    // This example verifies the id_token.  (The access_token is verified in this example:  Verify Okta Access Token

    jsonToken = CkJsonObject_Create();
    success = CkJsonObject_LoadFile(jsonToken,"qa_data/tokens/okta_access_token.json");

    // Load the public keys (Okta web keys), one of which is needed to validate.
    // The web keys JSON looks like this:
    // {
    //   "keys": [
    //     {
    //       "kty": "RSA",
    //       "alg": "RS256",
    //       "kid": "anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ",
    //       "use": "sig",
    //       "e": "AQAB",
    //       "n": "jT8uAgd5w ... euLB1HaVw"
    //     },
    //     {
    // 	...
    //     }
    //   ]
    // }

    jsonWebKeys = CkJsonObject_Create();
    success = CkJsonObject_LoadFile(jsonWebKeys,"qa_data/tokens/okta_web_keys.json");

    // ------------------------
    // Step 1: Get the JOSE header from the JWT.  The JOSE header contains JSON.  One of the JSON members will be the key ID "kid" which identifies the web key to be used for validation.
    // 
    jwt = CkJwt_Create();
    idToken = CkJsonObject_stringOf(jsonToken,"id_token");
    joseHeader = CkJwt_getHeader(jwt,idToken);

    printf("%s\n",joseHeader);
    // The joseHeader contains this:   {"kid":"anSaRDPfWGOSCVNZEIZB9quCbNsdsvl5uWGBzxbudWQ","alg":"RS256"}

    json = CkJsonObject_Create();
    CkJsonObject_Load(json,joseHeader);
    kid = CkJsonObject_stringOf(json,"kid");
    printf("kid to find: %s\n",kid);

    // ------------------------
    // Step 2: Find the key with the same "kid" in the Okta web keys.

    sbKid = CkStringBuilder_Create();
    e = "";
    n = "";

    i = 0;
    count_i = CkJsonObject_SizeOfArray(jsonWebKeys,"keys");
    bFound = FALSE;
    iMatch = 0;
    while ((bFound == FALSE) && (i < count_i)) {
        CkJsonObject_putI(jsonWebKeys,i);
        CkStringBuilder_Clear(sbKid);
        CkJsonObject_StringOfSb(jsonWebKeys,"keys[i].kid",sbKid);
        printf("checking kid: %s\n",CkStringBuilder_getAsString(sbKid));

        if (CkStringBuilder_ContentsEqual(sbKid,kid,TRUE) == TRUE) {
            e = CkJsonObject_stringOf(jsonWebKeys,"keys[i].e");
            n = CkJsonObject_stringOf(jsonWebKeys,"keys[i].n");
            // Exit the loop. 
            printf("Found matching kid.\n");
            iMatch = i;
            bFound = TRUE;
        }

        i = i + 1;
    }

    if (bFound == FALSE) {
        printf("No matching key ID found.\n");
        CkJsonObject_Dispose(jsonToken);
        CkJsonObject_Dispose(jsonWebKeys);
        CkJwt_Dispose(jwt);
        CkJsonObject_Dispose(json);
        CkStringBuilder_Dispose(sbKid);
        return;
    }

    printf("Matching key:\n");
    printf("  exponent = %s\n",e);
    printf("  modulus = %s\n",n);

    // ------------------------
    // Step 3: Load the RSA modulus and exponent into a Chilkat public key object.
    pubkey = CkPublicKey_Create();

    // Get the matching JSON key from the array of keys.
    CkJsonObject_putI(jsonWebKeys,iMatch);
    jsonWebKey = CkJsonObject_ObjectOf(jsonWebKeys,"keys[i]");
    success = CkPublicKey_LoadFromString(pubkey,CkJsonObject_emit(jsonWebKey));
    if (success == FALSE) {
        printf("Failed to load JSON web key.\n");
        printf("%s\n",CkJsonObject_emit(jsonWebKey));
        printf("%s\n",CkPublicKey_lastErrorText(pubkey));
        CkJsonObject_Dispose(jsonWebKey);
        CkJsonObject_Dispose(jsonToken);
        CkJsonObject_Dispose(jsonWebKeys);
        CkJwt_Dispose(jwt);
        CkJsonObject_Dispose(json);
        CkStringBuilder_Dispose(sbKid);
        CkPublicKey_Dispose(pubkey);
        return;
    }

    CkJsonObject_Dispose(jsonWebKey);
    printf("successfully loaded web key.\n");

    // OK.. we have the desired JSON web key loaded into our public key object.
    // Now we can verify the access token.

    // ------------------------
    // Step 4: Verify the access token.
    bVerified = CkJwt_VerifyJwtPk(jwt,idToken,pubkey);
    if (bVerified == TRUE) {
        printf("The ID token is valid.\n");
    }
    else {
        printf("The ID token is NOT valid.\n");
    }

    // ------------------------
    // Step 5: Extract the claims (payload) from the ID token and examine them..

    claims = CkJwt_getPayload(jwt,idToken);

    jsonClaims = CkJsonObject_Create();
    CkJsonObject_Load(jsonClaims,claims);
    CkJsonObject_putEmitCompact(jsonClaims,FALSE);
    printf("%s\n",CkJsonObject_emit(jsonClaims));

    // Sample claims:
    // {
    //   "sub": "00utrr8ehubooPhjj356",
    //   "ver": 1,
    //   "iss": "https://dev-765951.okta.com/oauth2/default",
    //   "aud": "0oatrr20vPYgVDlGr356",
    //   "iat": 1562190727,
    //   "exp": 1562194327,
    //   "jti": "ID.JvlMhlnCj5ZqqGjk-jlgcOxHEyVUwIl9_Kpz69U2D_4",
    //   "amr": [
    //     "pwd"
    //   ],
    //   "idp": "00os29azljkqyx99Q356",
    //   "auth_time": 1562190726,
    //   "at_hash": "SLMiVeyNWWEDaZ-O32nKMg"
    // }

    // The exp (expiry time) claim is the time at which this token will expire., expressed in Unix time. You should make sure that this time has not already passed.
    dtExp = CkDateTime_Create();
    CkDateTime_SetFromUnixTime(dtExp,FALSE,CkJsonObject_IntOf(jsonClaims,"exp"));
    printf("expire timestamp = %s\n",CkDateTime_getAsTimestamp(dtExp,FALSE));

    // Check to see if this date/time expires within 0 seconds (i.e. is already past)
    bExpired = CkDateTime_ExpiresWithin(dtExp,0,"seconds");
    printf("bExpired = %d\n",bExpired);


    CkJsonObject_Dispose(jsonToken);
    CkJsonObject_Dispose(jsonWebKeys);
    CkJwt_Dispose(jwt);
    CkJsonObject_Dispose(json);
    CkStringBuilder_Dispose(sbKid);
    CkPublicKey_Dispose(pubkey);
    CkJsonObject_Dispose(jsonClaims);
    CkDateTime_Dispose(dtExp);

    }

 

© 2000-2024 Chilkat Software, Inc. All Rights Reserved.