mirror of
https://github.com/meteor/meteor.git
synced 2026-05-02 03:01:46 -04:00
docs-packages: oauth encryption
This commit is contained in:
97
v3-docs/docs/packages/oauth-encryption.md
Normal file
97
v3-docs/docs/packages/oauth-encryption.md
Normal file
@@ -0,0 +1,97 @@
|
||||
# OAuth Encryption
|
||||
Encrypts sensitive login secrets stored in the database such as a
|
||||
login service's application secret key and users' access tokens.
|
||||
|
||||
|
||||
## Generating a Key
|
||||
|
||||
The encryption key is 16 bytes, encoded in Base64.
|
||||
|
||||
To generate a key:
|
||||
|
||||
```bash
|
||||
$ meteor node -e 'console.log(require("crypto").randomBytes(16).toString("base64"))'
|
||||
```
|
||||
|
||||
|
||||
## Using oauth-encryption with accounts
|
||||
|
||||
On the server only, use the `oauthSecretKey` option to `Accounts.config`:
|
||||
|
||||
```js
|
||||
Accounts.config({ oauthSecretKey: 'onsqJ+1e4iGFlV0nhZYobg==' });
|
||||
```
|
||||
|
||||
This call to `Accounts.config` should be made at load time (place at
|
||||
the top level of your source file), not called from inside of a
|
||||
`Meteor.startup` block.
|
||||
|
||||
To avoid storing the secret key in your application's source code, you
|
||||
can use [`Meteor.settings`](http://docs.meteor.com/#meteor_settings):
|
||||
|
||||
```js
|
||||
Accounts.config({ oauthSecretKey: Meteor.settings.oauthSecretKey });
|
||||
```
|
||||
|
||||
|
||||
## Migrating unencrypted user tokens
|
||||
|
||||
This example for Twitter shows how existing unencrypted user tokens
|
||||
can be encrypted. The query finds user documents which have a Twitter
|
||||
access token but not the `algorithm` field which is created when the
|
||||
token is encrypted. The relevant fields in the service data are then
|
||||
encrypted.
|
||||
|
||||
```js
|
||||
const cursor = Meteor.users.find({
|
||||
$and: [
|
||||
{ 'services.twitter.accessToken': { $exists: true } },
|
||||
{ 'services.twitter.accessToken.algorithm': { $exists: false } }
|
||||
]
|
||||
});
|
||||
|
||||
cursor.forEach((userDoc) => {
|
||||
const set = {};
|
||||
|
||||
['accessToken', 'accessTokenSecret', 'refreshToken'].forEach((field) => {
|
||||
const plaintext = userDoc.services.twitter[field];
|
||||
|
||||
if (!_.isString(plaintext)) {
|
||||
return;
|
||||
}
|
||||
|
||||
set[`services.twitter.${field}`] = OAuthEncryption.seal(
|
||||
plaintext,
|
||||
userDoc._id
|
||||
);
|
||||
});
|
||||
|
||||
Meteor.users.update(userDoc._id, { $set: set });
|
||||
});
|
||||
```
|
||||
|
||||
## Using oauth-encryption without accounts
|
||||
|
||||
If you're using the oauth packages directly instead of through the
|
||||
Meteor accounts packages, you can load the OAuth encryption key
|
||||
directly using `OAuthEncryption.loadKey`:
|
||||
|
||||
```js
|
||||
OAuthEncryption.loadKey('onsqJ+1e4iGFlV0nhZYobg==');
|
||||
```
|
||||
|
||||
If you call `retrieveCredential` (such as
|
||||
`Twitter.retrieveCredential`) as part of your process, you'll find
|
||||
when using oauth-encryption that the sensitive service data fields
|
||||
will be encrypted.
|
||||
|
||||
You can decrypt them using `OAuth.openSecrets`:
|
||||
|
||||
```js
|
||||
const credentials = Twitter.retrieveCredential(token);
|
||||
const serviceData = OAuth.openSecrets(credentials.serviceData);
|
||||
```
|
||||
|
||||
## Using oauth-encryption on Windows
|
||||
|
||||
This package depends on [npm-node-aes-gcm](https://github.com/meteor/meteor/tree/devel/packages/non-core/npm-node-aes-gcm), which requires you to have OpenSSL installed on your system to run. To install OpenSSL on Windows, use one of the binaries on [this page](http://slproweb.com/products/Win32OpenSSL.html). Don't forget to install the Visual Studio 2008 redistributables if you don't have them yet.
|
||||
Reference in New Issue
Block a user