What is oAuth2
oAuth2 is a authentication framework that allows third party applications to authenticate with services without the need for the user to provide credentials to the third party application.
For example if our application would like to connect to an end users google account we can get authorization by asking the user to authenticate with google and google giving our application a security token. The application never knows the credentials used but gets access using the token provided by google.
Normally authentication would involve a login screen that allows the user to type in a username and password and then the application would use these credentials to talk to the third party service.
In order to hide the actual credentials from the application the following process is used by oAuth2 to authenticate an application
- User instructs application to connect to a service secured by oAuth2
- Application starts Authentication Process using your client id and/or client secret by calling the authentication web service
- Depending on the options the call returns a URL or web page and that url or webpage which contains the actual login needs to be shown to the user
- The application uses one of the available methods to get a response from oAuth2
- The user now authenticates on the web page.
- in the meantime the application has to wait and continuously check for a response from the authentication
- once the user authenticates the application can then get an access token that can be used later to authenticate with the service
Interfacing DataFlex with oAuth2 authentication is a bit complicated mainly due to 2 missing parts of the language
- DataFlex is single threaded which makes it hard to wait for things while keeping the user interface from being locked up
- DataFlex does not have any support for TCPIP communication which is needed to listen to a port on localhost
One way to make life easier is to use the Chilkat oAuth2 component. Chilkat solves the second issue by handling all the TCPIP communication for us
Registering the application
In order to use oAuth2 for any service the application has to be registered with that service in our example Google. This registration will give us a client id as well as a client secret for our application that will be used to authenticate
For this example we will create 2 views. View 1 will be our view requesting authentication, view 2 will contain the browser window. You could also call the browser as a separate program.
To show the two part process we will split the functions over two buttons. First button will initiate the authentication process, second button will then after successful authentication get the token.
At the top of the view we will need to use the chilkat package. Of course you will need to download and install the chilkat library
// // use chilkat Use ChilkatAx-9.5.0-win32.pkg Procedure ChilkatGlobalUnlock Handle hoGlob Boolean iSuccess Integer iStatus String sTemp1 Get Create (RefClass(cComChilkatGlobal)) to hoGlob If (not(IsComObjectCreated(hoGlob))) Begin Send CreateComObject of hoGlob End Get ComUnlockBundle of hoGlob "Anything for 30-day trial" to iSuccess If (iSuccess <> True) Begin Get ComLastErrorText of hoGlob to sTemp1 Showln sTemp1 Procedure_Return End Get ComUnlockStatus of hoGlob to iStatus If (iStatus = 2) Begin Showln "Unlocked using purchased unlock code." End Else Begin Showln "Unlocked in trial mode." End End_Procedure
the code above will globally unlock all chilkat classes using your credentials supplied by chilkat
Step 1 – Start Authentication
Procedure OnClick Handle hoOauth2 hoSbJson Boolean iSuccess bTemp1 String sUrl sTemp1 Integer iNumMsWaited iTemp1 // make sure chilkat is unlocked Send ChilkatGlobalUnlock // create oAuth2 object Get Create (RefClass(cComChilkatOAuth2)) to hoOauth2 If (not(IsComObjectCreated(hoOauth2))) Begin Send CreateComObject of hoOauth2 End // remember for step2 Set phoOAuth2 to hoOauth2 // For Google OAuth2, set the listen port equal to the port used // in the Authorized Redirect URL for the Client ID. // For example, in this case the Authorized Redirect URL would be http://localhost:55568/ // Your app should choose a port not likely not used by any other application. Set ComListenPort of hoOauth2 to 55568 Set ComAuthorizationEndpoint of hoOauth2 to "https://accounts.google.com/o/oauth2/v2/auth" Set ComTokenEndpoint of hoOauth2 to "https://www.googleapis.com/oauth2/v4/token" // Replace these with actual values. Set ComClientId of hoOauth2 to "YOUR APPS CLIENT ID HERE" Set ComClientSecret of hoOauth2 to "YOUR APPS CLIENT SECRET HERE" Set ComCodeChallenge of hoOauth2 to True Set ComCodeChallengeMethod of hoOauth2 to "S256" // This is the scope for Google Drive. // See https://developers.google.com/identity/protocols/googlescopes Set ComScope of hoOauth2 to "https://www.googleapis.com/auth/drive" // Begin the OAuth2 three-legged flow. This returns a URL that should be loaded in a browser. Get ComStartAuth of hoOauth2 to sUrl Get ComLastMethodSuccess of hoOauth2 to bTemp1 If (bTemp1 <> True) Begin Get ComLastErrorText of hoOauth2 to sTemp1 Showln sTemp1 Procedure_Return End Send ShowGoogleLogin sUrl End_Procedure
The OnClick procedure above first creates a chilkat oAuth2 object. We remeber the object id in a property for step 2 later.
oAuth2 uses a local port to communicate. In this case we use a port that is likely not used. A better implementation would be to find a random unused port.
We set the endpoints to the google endpoints
We also need to set the client id and client secret. These are supplied to you when registering your application with google
We also need to set the scope of our authentication which will tell Google what services we are trying to authenticate for.
The next step is to start the authentication process. This will return a URL that needs to be shown to the user.
The last line Send ShowGoogleLogin sUrl will be handled in our next step
Show the Url in the browser
We need to be able to show the url returned by the authentication process to the user.
For this example i decided to use a web browser in a view but you can also simply launch a web browser as a separate application. There is no connection needed between our application and the browser
The code for the browser view is as follows
Use Windows.pkg Use DFClient.pkg Use cComWebBrowser.pkg Activate_View Activate_oBrowserView for oBrowserView Object oBrowserView is a dbView Property String psUrlToNavigate "" Set Border_Style to Border_Thick Set Size to 200 300 Set Location to 2 2 Set Label to "BrowserView" Object oWebBrowser is a cComWebBrowser Set Size to 254 497 Set Location to 34 21 Set peAnchors to anAll // When the control is created, point to a default web site Procedure OnCreate Forward Send OnCreate Send ComNavigate (psUrlToNavigate(Self)) 0 0 0 0 End_Procedure End_Object End_Object Procedure ShowGoogleLogin String sURL Set psUrlToNavigate of oBrowserView to sURL Send Activate_oBrowserView End_Procedure
Now we need to create the second part of our authentication that needs to be executed after the user actually authenticates
Procedure OnClick Handle hoOauth2 Integer iNumMsWaited iTemp1 iSuccess String sTemp1 Get phoOAuth2 to hoOauth2 // Now wait for the authorization. // We'll wait for a max of 30 seconds. Move 0 to iNumMsWaited While ((iNumMsWaited < 30000) and ((ComAuthFlowState(hoOauth2)) < 3)) Send ComSleepMs to hoOauth2 100 Move (iNumMsWaited + 100) to iNumMsWaited Loop // If there was no response from the browser within 30 seconds, then // the AuthFlowState will be equal to 1 or 2. // 1: Waiting for Redirect. The OAuth2 background thread is waiting to receive the redirect HTTP request from the browser. // 2: Waiting for Final Response. The OAuth2 background thread is waiting for the final access token response. // In that case, cancel the background task started in the call to StartAuth. Get ComAuthFlowState of hoOauth2 to iTemp1 If (iTemp1 < 3) Begin Get ComCancel of hoOauth2 to iSuccess Showln "No response from the browser!" Procedure_Return End // Check the AuthFlowState to see if authorization was granted, denied, or if some error occurred // The possible AuthFlowState values are: // 3: Completed with Success. The OAuth2 flow has completed, the background thread exited, and the successful JSON response is available in AccessTokenResponse property. // 4: Completed with Access Denied. The OAuth2 flow has completed, the background thread exited, and the error JSON is available in AccessTokenResponse property. // 5: Failed Prior to Completion. The OAuth2 flow failed to complete, the background thread exited, and the error information is available in the FailureInfo property. Get ComAuthFlowState of hoOauth2 to iTemp1 If (iTemp1 = 5) Begin Showln "OAuth2 failed to complete." Get ComFailureInfo of hoOauth2 to sTemp1 Showln sTemp1 Procedure_Return End Get ComAuthFlowState of hoOauth2 to iTemp1 If (iTemp1 = 4) Begin Showln "OAuth2 authorization was denied." Get ComAccessTokenResponse of hoOauth2 to sTemp1 Showln sTemp1 Procedure_Return End Get ComAuthFlowState of hoOauth2 to iTemp1 If (iTemp1 <> 3) Begin Get ComAuthFlowState of hoOauth2 to iTemp1 Showln "Unexpected AuthFlowState:" iTemp1 Procedure_Return End // Save the full JSON access token response to a file. Integer hoSbJson Get Create (RefClass(cComChilkatStringBuilder)) to hoSbJson If (not(IsComObjectCreated(hoSbJson))) Begin Send CreateComObject of hoSbJson End Get ComAccessTokenResponse of hoOauth2 to sTemp1 Get ComAppend of hoSbJson sTemp1 to iSuccess Get ComWriteFile of hoSbJson "qa_data/tokens/googleDrive.json" "utf-8" False to iSuccess Showln "OAuth2 authorization granted!" Get ComAccessToken of hoOauth2 to sTemp1 Showln "Access Token = " sTemp1 Send Destroy to hoSbJson Send Destroy to hoOauth2 Set phoOAuth2 to 0 End_Procedure
After validating that there was a proper response from the authentication server we get the response that includes the token and other information
To run this example click the first button. This will initiate the authentication process and then show the browser window with a goggle login (the login may be skipped if you are already logged in to google).
After logging in google will ask if you want to authorize the application. Allow the authorization and then close the browser window.
Now you can click the second button and the application will then get the authentication token that can be used to authenticate for any service calls later.