STANDALONE and SIMPLE!!! OAuth 2.0 identity provider integration.
Go to file
Vitaliy Filippov 40b0c7c3b7 Include more details in exceptions, add JSON Web Token implementation 2017-05-31 16:21:37 +03:00
src Include more details in exceptions, add JSON Web Token implementation 2017-05-31 16:21:37 +03:00
test Simplify everything 2015-04-19 00:29:09 +03:00
.gitattributes Adds .gitattributes that excludes paths when installed via --prefer-dist 2014-10-22 21:22:49 -04:00
.gitignore Setup base unit testing framework 2014-04-24 15:22:57 -07:00
.travis.yml Simplify everything 2015-04-19 00:29:09 +03:00 Updating path to PHPUnit to use the PHPUnit installed by Composer 2014-11-28 22:56:19 -05:00
LICENSE Copyright year bump 2014-05-20 19:48:16 +01:00 Include more details in exceptions, add JSON Web Token implementation 2017-05-31 16:21:37 +03:00
composer.json Simplify everything 2015-04-19 00:29:09 +03:00
phpunit.xml Use new coverage approach. 2014-05-03 11:30:26 +01:00


cURL is used instead of Guzzle, some useless wrapper code is removed. Tests still pass.

OAuth 2.0 Client

This package makes it stupidly simple to integrate your application with OAuth 2.0 identity providers.

Everyone is used to seeing those "Connect with Facebook/Google/etc" buttons around the Internet and social network integration is an important feature of most web-apps these days. Many of these sites use an Authentication and Authorization standard called OAuth 2.0.

It will work with any OAuth 2.0 provider (be it an OAuth 2.0 Server for your own API or Facebook) and provides support for popular systems out of the box. This package abstracts out some of the subtle but important differences between various providers, handles access tokens and refresh tokens, and allows you easy access to profile information on these other sites.


The following versions of PHP are supported.

  • PHP 5.4
  • PHP 5.5
  • PHP 5.6
  • PHP 7.0
  • HHVM


Authorization Code Flow

$provider = new \OAuth2\<ProviderName>([
    'clientId'      => 'XXXXXXXX',
    'clientSecret'  => 'XXXXXXXX',
    'redirectUri'   => 'https://your-registered-redirect-uri/',
    'scopes'        => ['email', '...', '...'],

// For example, with simplest GenericProvider and Keycloak
$provider = new \OAuth2\GenericProvider([
    'clientId'      => 'XXXXXXXX',
    'clientSecret'  => 'XXXXXXXX',
    'urlAuthorize'   => 'http://keycloak-server/auth/realms/example/protocol/openid-connect/auth',
    'urlAccessToken' => 'http://keycloak-server/auth/realms/example/protocol/openid-connect/token',
    'urlUserDetails' => 'http://keycloak-server/auth/realms/example/protocol/openid-connect/userinfo',
    'scopes'         => ['name', 'email'],

$useJWT = false;
$jwksEndpointURL = '';

if (!isset($_GET['code']))
    // If we don't have an authorization code then get one
    $authUrl = $provider->getAuthorizationUrl();
    $_SESSION['oauth2state'] = $provider->state;
    header('Location: '.$authUrl);
elseif (empty($_GET['state']) || ($_GET['state'] !== $_SESSION['oauth2state']))
    // Check given state against previously stored one to mitigate CSRF attack
    exit('Invalid state');
    // Try to get an access token (using the authorization code grant)
    $token = $provider->getAccessToken('authorization_code', [
        'code' => $_GET['code']

    // Optional: Now you have a token you can look up a users profile data
        if (!$useJWT)
            // We got an access token, let's now get the user's details
            $userDetails = $provider->getUserDetails($token);
            // If your tokens are JWT (JSON Web Tokens) (Keycloak's ones are),
            // you may decode and verify them instead of fetching user details from server
            $keys = \OAuth2\JWT::extractKeys(json_decode(file_get_contents($jwksEndpointURL), true));
            $userDetails = JWT::decode($token->accessToken, $keys);

            // You may also just decode it without verifying
            $userDetails = JWT::decode($token->accessToken, NULL);

        // Use these details to create a new profile
        printf('Hello %s!', $userDetails['firstname']);

    catch (Exception $e)
        // Failed to get user details
        exit('Oh dear...');

    // Use this to interact with an API on the users behalf
    echo $token->accessToken;

    // Use this to get a new access token if the old one expires
    echo $token->refreshToken;

    // Number of seconds until the access token will expire, and need refreshing
    echo $token->expires;

Refreshing a Token

$provider = new \OAuth2\<ProviderName>([
    'clientId'      => 'XXXXXXXX',
    'clientSecret'  => 'XXXXXXXX',
    'redirectUri'   => 'https://your-registered-redirect-uri/',

$token = $provider->getAccessToken('refresh_token', ['refresh_token' => $refreshToken]);

Built-In Providers

This package currently has built-in support for:

  • Basic GenericProvider suitable for any OAuth2 server
  • Eventbrite
  • Facebook
  • Github
  • Google
  • Instagram
  • LinkedIn
  • Microsoft

These are as many OAuth 2 services as we plan to support officially. Maintaining a wide selection of providers damages our ability to make this package the best it can be, especially as we progress towards v1.0.

Third-Party Providers

If you would like to support other providers, please make them available as a Composer package, then link to them below.

These providers allow integration with other providers not supported by oauth2-client. They may require an older version so please help them out with a pull request if you notice this.

Implementing your own provider

If you are working with an oauth2 service not supported out-of-the-box or by an existing package, it is quite simple to implement your own. Simply extend \OAuth2\AbstractProvider and implement the required abstract methods:

abstract public function urlAuthorize();
abstract public function urlAccessToken();
abstract public function urlUserDetails(\OAuth2\AccessToken $token);
abstract public function userDetails($response, \OAuth2\AccessToken $token);

Each of these abstract methods contain a docblock defining their expectations and typical behaviour. Once you have extended this class, you can simply follow the example above using your new Provider.

Custom account identifiers in access token responses

Some OAuth2 Server implementations include a field in their access token response defining some identifier for the user account that just requested the access token. In many cases this field, if present, is called "uid", but some providers define custom identifiers in their response. If your provider uses a nonstandard name for the "uid" field, when extending the AbstractProvider, in your new class, define a property public $uidKey and set it equal to whatever your provider uses as its key. For example, uses accountId as the key for the identifier field, so in that provider you would add a property:

public $uidKey = 'accountId';


Via Composer

$ composer require vitalif/oauth2-client


$ ./vendor/bin/phpunit



The MIT License (MIT). Please see License File for more information.