OIDAuthorizationRequest.h 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250
  1. /*! @file OIDAuthorizationRequest.h
  2. @brief AppAuth iOS SDK
  3. @copyright
  4. Copyright 2015 Google Inc. All Rights Reserved.
  5. @copydetails
  6. Licensed under the Apache License, Version 2.0 (the "License");
  7. you may not use this file except in compliance with the License.
  8. You may obtain a copy of the License at
  9. http://www.apache.org/licenses/LICENSE-2.0
  10. Unless required by applicable law or agreed to in writing, software
  11. distributed under the License is distributed on an "AS IS" BASIS,
  12. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. See the License for the specific language governing permissions and
  14. limitations under the License.
  15. */
  16. #import <Foundation/Foundation.h>
  17. // These files only declare string constants useful for constructing a @c OIDAuthorizationRequest,
  18. // so they are imported here for convenience.
  19. #import "OIDExternalUserAgentRequest.h"
  20. #import "OIDResponseTypes.h"
  21. #import "OIDScopes.h"
  22. @class OIDServiceConfiguration;
  23. NS_ASSUME_NONNULL_BEGIN
  24. /*! @brief The @c code_challenge_method value for the S256 code challenge.
  25. @see https://tools.ietf.org/html/rfc7636#section-4.3
  26. */
  27. extern NSString *const OIDOAuthorizationRequestCodeChallengeMethodS256;
  28. /*! @brief Represents an authorization request.
  29. @see https://tools.ietf.org/html/rfc6749#section-4
  30. @see https://tools.ietf.org/html/rfc6749#section-4.1.1
  31. */
  32. @interface OIDAuthorizationRequest :
  33. NSObject<NSCopying, NSSecureCoding, OIDExternalUserAgentRequest>
  34. /*! @brief The service's configuration.
  35. @remarks This configuration specifies how to connect to a particular OAuth provider.
  36. Configurations may be created manually, or via an OpenID Connect Discovery Document.
  37. */
  38. @property(nonatomic, readonly) OIDServiceConfiguration *configuration;
  39. /*! @brief The expected response type.
  40. @remarks response_type
  41. @discussion Generally 'code' if pure OAuth, otherwise a space-delimited list of of response
  42. types including 'code', 'token', and 'id_token' for OpenID Connect.
  43. @see https://tools.ietf.org/html/rfc6749#section-3.1.1
  44. @see http://openid.net/specs/openid-connect-core-1_0.html#rfc.section.3
  45. */
  46. @property(nonatomic, readonly) NSString *responseType;
  47. /*! @brief The client identifier.
  48. @remarks client_id
  49. @see https://tools.ietf.org/html/rfc6749#section-2.2
  50. */
  51. @property(nonatomic, readonly) NSString *clientID;
  52. /*! @brief The client secret.
  53. @remarks client_secret
  54. @discussion The client secret is used to prove that identity of the client when exchaning an
  55. authorization code for an access token.
  56. The client secret is not passed in the authorizationRequestURL. It is only used when
  57. exchanging the authorization code for an access token.
  58. @see https://tools.ietf.org/html/rfc6749#section-2.3.1
  59. */
  60. @property(nonatomic, readonly, nullable) NSString *clientSecret;
  61. /*! @brief The value of the scope parameter is expressed as a list of space-delimited,
  62. case-sensitive strings.
  63. @remarks scope
  64. @see https://tools.ietf.org/html/rfc6749#section-3.3
  65. */
  66. @property(nonatomic, readonly, nullable) NSString *scope;
  67. /*! @brief The client's redirect URI.
  68. @remarks redirect_uri
  69. @see https://tools.ietf.org/html/rfc6749#section-3.1.2
  70. */
  71. @property(nonatomic, readonly, nullable) NSURL *redirectURL;
  72. /*! @brief An opaque value used by the client to maintain state between the request and callback.
  73. @remarks state
  74. @discussion If this value is not explicitly set, this library will automatically add state and
  75. perform appropriate validation of the state in the authorization response. It is recommended
  76. that the default implementation of this parameter be used wherever possible. Typically used
  77. to prevent CSRF attacks, as recommended in RFC6819 Section 5.3.5.
  78. @see https://tools.ietf.org/html/rfc6749#section-4.1.1
  79. @see https://tools.ietf.org/html/rfc6819#section-5.3.5
  80. */
  81. @property(nonatomic, readonly, nullable) NSString *state;
  82. /*! @brief String value used to associate a Client session with an ID Token, and to mitigate replay
  83. attacks. The value is passed through unmodified from the Authentication Request to the ID
  84. Token. Sufficient entropy MUST be present in the nonce values used to prevent attackers from
  85. guessing values.
  86. @remarks nonce
  87. @discussion If this value is not explicitly set, this library will automatically add nonce and
  88. perform appropriate validation of the nonce in the ID Token.
  89. @see https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
  90. */
  91. @property(nonatomic, readonly, nullable) NSString *nonce;
  92. /*! @brief The PKCE code verifier.
  93. @remarks code_verifier
  94. @discussion The code verifier itself is not included in the authorization request that is sent
  95. on the wire, but needs to be in the token exchange request.
  96. @c OIDAuthorizationResponse.tokenExchangeRequest will create a @c OIDTokenRequest that
  97. includes this parameter automatically.
  98. @see https://tools.ietf.org/html/rfc7636#section-4.1
  99. */
  100. @property(nonatomic, readonly, nullable) NSString *codeVerifier;
  101. /*! @brief The PKCE code challenge, derived from #codeVerifier.
  102. @remarks code_challenge
  103. @see https://tools.ietf.org/html/rfc7636#section-4.2
  104. */
  105. @property(nonatomic, readonly, nullable) NSString *codeChallenge;
  106. /*! @brief The method used to compute the @c #codeChallenge
  107. @remarks code_challenge_method
  108. @see https://tools.ietf.org/html/rfc7636#section-4.3
  109. */
  110. @property(nonatomic, readonly, nullable) NSString *codeChallengeMethod;
  111. /*! @brief The client's additional authorization parameters.
  112. @see https://tools.ietf.org/html/rfc6749#section-3.1
  113. */
  114. @property(nonatomic, readonly, nullable) NSDictionary<NSString *, NSString *> *additionalParameters;
  115. /*! @internal
  116. @brief Unavailable. Please use
  117. @c initWithConfiguration:clientId:scopes:redirectURL:responseType:additionalParameters:.
  118. */
  119. - (instancetype)init NS_UNAVAILABLE;
  120. /*! @brief Creates an authorization request with opinionated defaults (a secure @c state, and
  121. PKCE with S256 as the @c code_challenge_method).
  122. @param configuration The service's configuration.
  123. @param clientID The client identifier.
  124. @param scopes An array of scopes to combine into a single scope string per the OAuth2 spec.
  125. @param redirectURL The client's redirect URI.
  126. @param responseType The expected response type.
  127. @param additionalParameters The client's additional authorization parameters.
  128. @remarks This convenience initializer generates a state parameter and PKCE challenges
  129. automatically.
  130. */
  131. - (instancetype)
  132. initWithConfiguration:(OIDServiceConfiguration *)configuration
  133. clientId:(NSString *)clientID
  134. scopes:(nullable NSArray<NSString *> *)scopes
  135. redirectURL:(NSURL *)redirectURL
  136. responseType:(NSString *)responseType
  137. additionalParameters:(nullable NSDictionary<NSString *, NSString *> *)additionalParameters;
  138. /*! @brief Creates an authorization request with opinionated defaults (a secure @c state, @c nonce,
  139. and PKCE with S256 as the @c code_challenge_method).
  140. @param configuration The service's configuration.
  141. @param clientID The client identifier.
  142. @param clientSecret The client secret.
  143. @param scopes An array of scopes to combine into a single scope string per the OAuth2 spec.
  144. @param redirectURL The client's redirect URI.
  145. @param responseType The expected response type.
  146. @param additionalParameters The client's additional authorization parameters.
  147. @remarks This convenience initializer generates a state parameter and PKCE challenges
  148. automatically.
  149. */
  150. - (instancetype)
  151. initWithConfiguration:(OIDServiceConfiguration *)configuration
  152. clientId:(NSString *)clientID
  153. clientSecret:(nullable NSString *)clientSecret
  154. scopes:(nullable NSArray<NSString *> *)scopes
  155. redirectURL:(NSURL *)redirectURL
  156. responseType:(NSString *)responseType
  157. additionalParameters:(nullable NSDictionary<NSString *, NSString *> *)additionalParameters;
  158. /*! @brief Designated initializer.
  159. @param configuration The service's configuration.
  160. @param clientID The client identifier.
  161. @param scope A scope string per the OAuth2 spec (a space-delimited set of scopes).
  162. @param redirectURL The client's redirect URI.
  163. @param responseType The expected response type.
  164. @param state An opaque value used by the client to maintain state between the request and
  165. callback.
  166. @param nonce String value used to associate a Client session with an ID Token. Can be set to nil
  167. if not using OpenID Connect, although pure OAuth servers should ignore params they don't
  168. understand anyway.
  169. @param codeVerifier The PKCE code verifier. See @c OIDAuthorizationRequest.generateCodeVerifier.
  170. @param codeChallenge The PKCE code challenge, calculated from the code verifier such as with
  171. @c OIDAuthorizationRequest.codeChallengeS256ForVerifier:.
  172. @param codeChallengeMethod The PKCE code challenge method.
  173. ::OIDOAuthorizationRequestCodeChallengeMethodS256 when
  174. @c OIDAuthorizationRequest.codeChallengeS256ForVerifier: is used to create the code
  175. challenge.
  176. @param additionalParameters The client's additional authorization parameters.
  177. */
  178. - (instancetype)
  179. initWithConfiguration:(OIDServiceConfiguration *)configuration
  180. clientId:(NSString *)clientID
  181. clientSecret:(nullable NSString *)clientSecret
  182. scope:(nullable NSString *)scope
  183. redirectURL:(nullable NSURL *)redirectURL
  184. responseType:(NSString *)responseType
  185. state:(nullable NSString *)state
  186. nonce:(nullable NSString *)nonce
  187. codeVerifier:(nullable NSString *)codeVerifier
  188. codeChallenge:(nullable NSString *)codeChallenge
  189. codeChallengeMethod:(nullable NSString *)codeChallengeMethod
  190. additionalParameters:(nullable NSDictionary<NSString *, NSString *> *)additionalParameters
  191. NS_DESIGNATED_INITIALIZER;
  192. /*! @brief Constructs the request URI by adding the request parameters to the query component of the
  193. authorization endpoint URI using the "application/x-www-form-urlencoded" format.
  194. @return A URL representing the authorization request.
  195. @see https://tools.ietf.org/html/rfc6749#section-4.1.1
  196. */
  197. - (NSURL *)authorizationRequestURL;
  198. /*! @brief Generates an OAuth state param using a random source.
  199. @return The generated state.
  200. @see https://tools.ietf.org/html/rfc6819#section-5.3.5
  201. */
  202. + (nullable NSString *)generateState;
  203. /*! @brief Constructs a PKCE-compliant code verifier.
  204. @return The generated code verifier.
  205. @see https://tools.ietf.org/html/rfc7636#section-4.1
  206. */
  207. + (nullable NSString *)generateCodeVerifier;
  208. /*! @brief Creates a PKCE S256 codeChallenge from the codeVerifier.
  209. @param codeVerifier The code verifier from which the code challenge will be derived.
  210. @return The generated code challenge.
  211. @details Generate a secure code verifier to pass into this method with
  212. @c OIDAuthorizationRequest.generateCodeVerifier. The matching @c #codeChallengeMethod for
  213. @c #codeChallenge%s created by this method is
  214. ::OIDOAuthorizationRequestCodeChallengeMethodS256.
  215. @see https://tools.ietf.org/html/rfc7636#section-4.1
  216. */
  217. + (nullable NSString *)codeChallengeS256ForVerifier:(nullable NSString *)codeVerifier;
  218. @end
  219. NS_ASSUME_NONNULL_END