# API tokens

In this guide we will see how you can create an API token system to execute request as an authenticated user.

This feature is in our roadmap (opens new window). This guide is a workaround to achieve this feature before we support it natively in strapi.

# Introduction

The goal is to be able to request API endpoints with a query parameter token that authenticates as a user. eg. /restaurants?token=my-secret-token.

To achieve this feature in development, we will have to customize the users-permissions plugin. This guide will help you understand how to customize all your applications. You can read more about Strapi plugins and customization.

# Create the Token Content Type

To manage your tokens, you will have to create a new Content Type named token.

  • string attribute named token
  • relation attribute Token (user) - Token has and belongs to one User - User (token)

Then add some users and create some token linked to these users.

# Setup the file to override

We now have to customize the function that verifies the token token. Strapi has an Authentication process that uses JWT tokens, we will reuse this function to customize the verification.

Here is the function (opens new window) that manages the JWT validation.

To be able to customize it, you will have to create a new file in your application ./extensions/users-permissions/config/policies/permissions.js.

Then copy the original function that is on GitHub and paste it in your new file.

When it's done, the Strapi application will use this function instead of the core one. We are ready to customize it.

# Add token validation logic

You will have to update the first lines of this function.

Path 鈥 ./extensions/users-permissions/config/policies/permissions.js

const _ = require('lodash');

module.exports = async (ctx, next) => {
  let role;

 if (ctx.state.user) {
    // request is already authenticated in a different way
    return next();
  }

  // add the detection of `token` query parameter
  if (
    (ctx.request && ctx.request.header && ctx.request.header.authorization) ||
    (ctx.request.query && ctx.request.query.token)
    ) {
    try {
      // init `id` and `isAdmin` outside of validation blocks
      let id;
      let isAdmin;

      if (ctx.request.query && ctx.request.query.token) {
        // find the token entry that match the token from the request
        const [token] = await strapi.query('token').find({token: ctx.request.query.token});

        if (!token) {
          throw new Error(`Invalid token: This token doesn't exist`);
        } else {
          if (token.user && typeof token.token === 'string') {
            id = token.user.id;
          }
          isAdmin = false;
        }

        delete ctx.request.query.token;
      } else if (ctx.request && ctx.request.header && ctx.request.header.authorization) {
        // use the current system with JWT in the header
        const decoded = await strapi.plugins[
          'users-permissions'
        ].services.jwt.getToken(ctx);

        id = decoded.id;
        isAdmin = decoded.isAdmin || false;
      }

      // this is the line that already exist in the code
      if (id === undefined) {
        throw new Error('Invalid token: Token did not contain required fields');
      }

      ...

And tada! You can now create a token, link it to a user and use it in your URLs with token as query parameters.