Home Backend Development Golang How to implement authentication and authorization using Golang

How to implement authentication and authorization using Golang

Jun 24, 2023 am 08:34 AM
golang Authentication Authorize

With the continuous development of Internet applications, user authentication and authorization are becoming more and more important. Authentication is the process of verifying that a user has permission to access a system, while authorization is the process of determining what actions a user can perform. In this article, we will discuss how to implement authentication and authorization using Golang.

  1. Authentication using JWT

JWT (JSON Web Tokens) is a compact and self-contained way to represent a user's identity. It contains metadata and claims that can be verified and decoded. Generally speaking, JWT contains three parts: header, payload and signature.

Golang provides many useful libraries to help us implement JWT, such as: jwt-go. Generate, decode and verify JWT easily using the jwt-go library. Here is a sample code that uses the jwt-go library to generate a JWT:

import (
    "time"
    "github.com/dgrijalva/jwt-go"
)
  
func CreateToken(userId string) (string, error) {
    token := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{
        "user_id": userId,
        "exp":     time.Now().Add(time.Hour * 24).Unix(),
    })
  
    return token.SignedString([]byte("your-secret"))
}
Copy after login

In the above code, we create a JWT that contains the current user's ID and expiration time. Then sign the JWT using the jwt.SigningMethodHS256 method and the "your-secret" key. Finally, the JWT string is returned to the caller.

For each HTTP request, we can use JWT for authentication. Once the user logs in successfully, we can return the generated JWT to the client. The client can send the JWT to the server as part of the "Authorization" header on every subsequent request. The server decodes the JWT and verifies the signature to ensure it is legitimate. Below is a sample code that uses the jwt-go library to validate JWT:

import (
    "net/http"
    "github.com/dgrijalva/jwt-go"
)
  
func ValidateTokenMiddleware(next http.Handler) http.Handler {
    return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
        tokenHeader := r.Header.Get("Authorization")
        if tokenHeader == "" {
            w.WriteHeader(http.StatusUnauthorized)
            return
        }
  
        token, err := jwt.Parse(tokenHeader, func(token *jwt.Token) (interface{}, error) {
            return []byte("your-secret"), nil
        })
  
        if err != nil || !token.Valid {
            w.WriteHeader(http.StatusUnauthorized)
            return
        }
  
        next.ServeHTTP(w, r)
    })
}
Copy after login

In the above code, we define a middleware called ValidateTokenMiddleware, which is responsible for validating JWT. ValidateTokenMiddleware will check whether the HTTP header contains an Authorization token and validate it. If the JWT is invalid, it returns an HTTP 401 Unauthorized response. Otherwise, it will continue processing the request.

Using JWT for authentication ensures that the request comes from a legitimate user and provides higher security.

  1. Using Roles for Authorization

In modern web applications, users often must have different roles and permissions. For example, an administrator may have permissions to perform higher-level operations that ordinary users do not. Therefore, we need to authorize different user roles separately.

In Golang, a popular approach is to use the role-based access control (RBAC) model. In the RBAC model, each role is given different permissions, and users are assigned to one or more roles. Then, before performing a specific action, the system checks whether the user has permission to perform that action.

The following is a sample code using the role-based access control model:

type Role string
  
const (
    AdminRole  Role = "admin"
    UserRole   Role = "user"
)
  
type User struct {
    ID    string `json:"id"`
    Name  string `json:"name"`
    Email string `json:"email"`
    Role  Role   `json:"role"`
}
  
// Check if the user has permission to access the resource based on the specified role.
func HasPermission(user *User, requiredRole Role) bool {
    return user.Role == requiredRole || user.Role == AdminRole
}
Copy after login

In the above code, we define an enumeration type named Role, which contains the List of roles used in the application. In the User structure, we assign each user to one or more roles and use the HasPermission function to check whether the user has permission to perform a specific operation. In this example, the HasPermission function will return true only if the user's role is AdminRole or requiredRole.

We can also use other methods, such as using middleware to check user roles and permissions. The following is a sample code based on middleware:

func AdminOnlyMiddleware(next http.Handler) http.Handler {
    return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
        user, ok := r.Context().Value("user").(*User)
        if !ok || !HasPermission(user, AdminRole) {
            w.WriteHeader(http.StatusForbidden)
            return
        }
  
        next.ServeHTTP(w, r)
    })
}
Copy after login

In the above code, we define a middleware named AdminOnlyMiddleware. This middleware will get the user role from the context of the HTTP request and check if the user has the necessary permissions to perform the action. If the user does not have permission, it will return an HTTP 403 Forbidden response.

If we are using an application based on a web framework, we can register the middleware directly on the route. For example, we can register AdminOnlyMiddleware for API endpoints that require administrator privileges:

router.Handle("/api/dashboard", AdminOnlyMiddleware(http.HandlerFunc(handler)))
Copy after login

In the above code, only users with administrator privileges can access the "/api/dashboard" endpoint.

Summary

In this article, we introduced how to implement authentication and authorization using Golang. We use JWT to verify that the user has permission to access the system and a role-based access control model to check if the user has permission to perform a specific action. These technologies can help us create web applications that are secure, scalable, and easy to maintain.

The above is the detailed content of How to implement authentication and authorization using Golang. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to safely read and write files using Golang? How to safely read and write files using Golang? Jun 06, 2024 pm 05:14 PM

Reading and writing files safely in Go is crucial. Guidelines include: Checking file permissions Closing files using defer Validating file paths Using context timeouts Following these guidelines ensures the security of your data and the robustness of your application.

How to configure connection pool for Golang database connection? How to configure connection pool for Golang database connection? Jun 06, 2024 am 11:21 AM

How to configure connection pooling for Go database connections? Use the DB type in the database/sql package to create a database connection; set MaxOpenConns to control the maximum number of concurrent connections; set MaxIdleConns to set the maximum number of idle connections; set ConnMaxLifetime to control the maximum life cycle of the connection.

How to save JSON data to database in Golang? How to save JSON data to database in Golang? Jun 06, 2024 am 11:24 AM

JSON data can be saved into a MySQL database by using the gjson library or the json.Unmarshal function. The gjson library provides convenience methods to parse JSON fields, and the json.Unmarshal function requires a target type pointer to unmarshal JSON data. Both methods require preparing SQL statements and performing insert operations to persist the data into the database.

Golang framework vs. Go framework: Comparison of internal architecture and external features Golang framework vs. Go framework: Comparison of internal architecture and external features Jun 06, 2024 pm 12:37 PM

The difference between the GoLang framework and the Go framework is reflected in the internal architecture and external features. The GoLang framework is based on the Go standard library and extends its functionality, while the Go framework consists of independent libraries to achieve specific purposes. The GoLang framework is more flexible and the Go framework is easier to use. The GoLang framework has a slight advantage in performance, and the Go framework is more scalable. Case: gin-gonic (Go framework) is used to build REST API, while Echo (GoLang framework) is used to build web applications.

Transforming from front-end to back-end development, is it more promising to learn Java or Golang? Transforming from front-end to back-end development, is it more promising to learn Java or Golang? Apr 02, 2025 am 09:12 AM

Backend learning path: The exploration journey from front-end to back-end As a back-end beginner who transforms from front-end development, you already have the foundation of nodejs,...

How to find the first substring matched by a Golang regular expression? How to find the first substring matched by a Golang regular expression? Jun 06, 2024 am 10:51 AM

The FindStringSubmatch function finds the first substring matched by a regular expression: the function returns a slice containing the matching substring, with the first element being the entire matched string and subsequent elements being individual substrings. Code example: regexp.FindStringSubmatch(text,pattern) returns a slice of matching substrings. Practical case: It can be used to match the domain name in the email address, for example: email:="user@example.com", pattern:=@([^\s]+)$ to get the domain name match[1].

Golang framework development practical tutorial: FAQs Golang framework development practical tutorial: FAQs Jun 06, 2024 am 11:02 AM

Go framework development FAQ: Framework selection: Depends on application requirements and developer preferences, such as Gin (API), Echo (extensible), Beego (ORM), Iris (performance). Installation and use: Use the gomod command to install, import the framework and use it. Database interaction: Use ORM libraries, such as gorm, to establish database connections and operations. Authentication and authorization: Use session management and authentication middleware such as gin-contrib/sessions. Practical case: Use the Gin framework to build a simple blog API that provides POST, GET and other functions.

How to use predefined time zone with Golang? How to use predefined time zone with Golang? Jun 06, 2024 pm 01:02 PM

Using predefined time zones in Go includes the following steps: Import the "time" package. Load a specific time zone through the LoadLocation function. Use the loaded time zone in operations such as creating Time objects, parsing time strings, and performing date and time conversions. Compare dates using different time zones to illustrate the application of the predefined time zone feature.

See all articles