2.5 KiB
JWT authentication with Tiptap Collab
In our first tutorial, we've gone from a simple textarea to a fully collaborative Tiptap editor instance. However, the JWT that is given by Tiptap Collab is valid for just a few hours, which is enough for testing, but certainly not enough for a real live application.
What is a JWT
In a short explanation, a JWT (JSON Web Token) is a json object that is cryptographically signed, which means a generated JWT cannot be altered.
How to generate a JWT
The JWT must be generated on the server side, as your secret
must not leave your server (i.e. don't even try to generate the JWT on the frontend).
You can use the following snippet on a NodeJS server and build an API around it.
import jsonwebtoken from 'jsonwebtoken'
const jwt = jsonwebtoken.sign({ /* object to be encoded in the JWT */ }, 'your_secret')
// this JWT should be sent in the `token` field of the provider. Never expose 'your_secret' to a frontend!
A full server / API example is available here.
Make sure to put the secret
inside the server environment variable (or just make it a constant in the server file, don't transfer it from the client).
You probably want to create an API call like GET /getCollabToken
which will generate the JWT based on the server secret and the list of documents that the user is allowed to access.
How to limit access to specific documents
Documents can only be accessed by knowing the exact document name, as there is no way to get a list of documents from TiptapCollab.
Thus, it's a good practice to name them like userUuid/documentUuid
(i.e. 1500c624-8f9f-496a-b196-5e5dd8ec3c25/7865975c-38d0-4bb5-846b-df909cdc66d3
), which
already makes it impossible to open random documents by guessing the name.
If you want to further limit which documents can be accessed using which JWT, you can encode the allowedDocumentNames
property in the JWT, as in the following
example. The created JWT will only allow access to the document(s) specified.
import jsonwebtoken from 'jsonwebtoken'
const jwt = jsonwebtoken.sign({
allowedDocumentNames: [
'1500c624-8f9f-496a-b196-5e5dd8ec3c25/7865975c-38d0-4bb5-846b-df909cdc66d3', // userUuid/documentUuid
'1500c624-8f9f-496a-b196-5e5dd8ec3c25/*' // userUuid/*
]
}, 'your_secret')
// this JWT should be sent in the `token` field of the provider. Never expose 'your_secret' to a frontend!