npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

nestjs-keycloak-auth

v1.1.0

Published

Keycloak authentication and authorization module for NestJS

Readme

NestJS Keycloak Auth

npm version npm downloads GitHub Issues or Pull Requests GitHub License codecov OpenSSF Scorecard

A bearer-only Keycloak authentication and authorization module for NestJS. Uses standard OIDC discovery and has zero runtime dependency on keycloak-connect.

Features

  • Bearer-token API authentication and authorization for NestJS.
  • OIDC discovery — endpoints resolved from .well-known/openid-configuration (with fallback).
  • ONLINE and OFFLINE token validation (introspection + JWKS signature verification).
  • Algorithm allowlist — only RS, ES, and PS family algorithms are accepted during offline validation.
  • Per-realm notBefore revocation state for multi-tenant safety.
  • Resource/scope authorization via UMA (@Resource, @Scopes, @ConditionalScopes).
  • Role authorization (@Roles) with configurable role merge and match modes.
  • OIDC back-channel logout (sid/sub revocation).
  • Typed error hierarchy — all library errors extend KeycloakAuthError for easy catching.
  • Compatible with Fastify platform.

Runtime Scope (Important)

  • This package is designed for bearer-only API/server flows.
  • It does not implement browser/session middleware flows such as login redirects, auth-code callback exchange, session/cookie grant stores, or logout endpoints.
  • It implements Keycloak admin callback endpoints:
    • POST /k_push_not_before for realm notBefore revocation updates (used by OFFLINE token validation).
    • POST /k_logout for OIDC back-channel logout token handling (sid/sub revocation).

Installation

Yarn

yarn add nestjs-keycloak-auth

NPM

npm install nestjs-keycloak-auth --save

Getting Started

Module registration

Registering the module:

KeycloakAuthModule.register({
  authServerUrl: 'http://localhost:8080', // might be http://localhost:8080/auth for older keycloak versions
  realm: 'master',
  clientId: 'my-nestjs-app',
  secret: 'secret',
  bearerOnly: true,
  policyEnforcement: PolicyEnforcementMode.PERMISSIVE, // optional
  tokenValidation: TokenValidation.ONLINE, // optional
  backchannelLogoutTtlMs: 24 * 60 * 60 * 1000, // optional, defaults to 24 hours
});

Async registration is also available:

KeycloakAuthModule.registerAsync({
  useExisting: KeycloakConfigService,
  imports: [ConfigModule],
});

KeycloakConfigService

import { Injectable } from '@nestjs/common';
import {
  KeycloakAuthOptions,
  KeycloakAuthOptionsFactory,
  PolicyEnforcementMode,
  TokenValidation,
} from 'nestjs-keycloak-auth';

@Injectable()
export class KeycloakConfigService implements KeycloakAuthOptionsFactory {
  createKeycloakAuthOptions(): KeycloakAuthOptions {
    return {
      // http://localhost:8080/auth for older keycloak versions
      authServerUrl: 'http://localhost:8080',
      realm: 'master',
      clientId: 'my-nestjs-app',
      secret: 'secret',
      bearerOnly: true,
      policyEnforcement: PolicyEnforcementMode.PERMISSIVE,
      tokenValidation: TokenValidation.ONLINE,
      backchannelLogoutTtlMs: 24 * 60 * 60 * 1000,
    };
  }
}

You can also register by just providing the keycloak.json path and an optional module configuration:

KeycloakAuthModule.register(`./keycloak.json`, {
  policyEnforcement: PolicyEnforcementMode.PERMISSIVE,
  tokenValidation: TokenValidation.ONLINE,
});

Guards

Register any of the guards either globally, or scoped in your controller.

Global registration using APP_GUARD token

NOTE: These are in order, see https://docs.nestjs.com/guards#binding-guards for more information.

providers: [
  {
    provide: APP_GUARD,
    useClass: AuthGuard,
  },
  {
    provide: APP_GUARD,
    useClass: ResourceGuard,
  },
  {
    provide: APP_GUARD,
    useClass: RoleGuard,
  },
];

Scoped registration

@Controller('cats')
@UseGuards(AuthGuard, ResourceGuard)
export class CatsController {}

What do these guards do?

AuthGuard

Adds an authentication guard, you can also have it scoped if you like (using regular @UseGuards(AuthGuard) in your controllers). By default, it will throw a 401 unauthorized when it is unable to verify the JWT token or Bearer header is missing.

ResourceGuard

Adds a resource guard, which is permissive by default (can be configured see options). Only controllers annotated with @Resource and methods with @Scopes are handled by this guard.

NOTE: This guard is not necessary if you are using role-based authorization exclusively. You can use role guard exclusively for that.

RoleGuard

Adds a role guard, can only be used in conjunction with resource guard when enforcement policy is PERMISSIVE, unless you only use role guard exclusively. Permissive by default. Used by controller methods annotated with @Roles (matching can be configured)

Configuring controllers

In your controllers, simply do:

import {
  Resource,
  Roles,
  Scopes,
  Public,
  RoleMatchingMode,
} from 'nestjs-keycloak-auth';
import { Controller, Get, Delete, Put, Post, Param } from '@nestjs/common';
import { Product } from './product';
import { ProductService } from './product.service';

@Controller()
@Resource(Product.name)
export class ProductController {
  constructor(private service: ProductService) {}

  @Get()
  @Public()
  async findAll() {
    return await this.service.findAll();
  }

  @Get()
  @Roles({ roles: ['admin', 'other'] })
  async findAllBarcodes() {
    return await this.service.findAllBarcodes();
  }

  @Get(':code')
  @Scopes('View')
  async findByCode(@Param('code') code: string) {
    return await this.service.findByCode(code);
  }

  @Post()
  @Scopes('Create')
  @ConditionalScopes((request, token) => {
    if (token.hasRealmRole('sysadmin')) {
      return ['Overwrite'];
    }
    return [];
  })
  async create(@Body() product: Product) {
    return await this.service.create(product);
  }

  @Delete(':code')
  @Scopes('Delete')
  @Roles({ roles: ['admin', 'realm:sysadmin'], mode: RoleMatchingMode.ALL })
  async deleteByCode(@Param('code') code: string) {
    return await this.service.deleteByCode(code);
  }

  @Put(':code')
  @Scopes('Edit')
  async update(@Param('code') code: string, @Body() product: Product) {
    return await this.service.update(code, product);
  }
}

Decorators

Here are the decorators you can use in your controllers.

| Decorator | Description | | ------------------ | --------------------------------------------------------------------------------------------------------- | | @AuthenticatedUser | Retrieves the current Keycloak logged-in user. (must be per method, unless controller is request scoped.) | | @AccessToken | Retrieves the access token used in the request | | @ResolvedScopes | Retrieves the resolved scopes (used in @ConditionalScopes) | | @EnforcerOptions | Keycloak enforcer options. | | @Public | Allow any user to use the route. | | @Resource | Keycloak application resource name. | | @Scopes | Keycloak application scopes. | | @ConditionalScopes | Conditional keycloak application scopes. | | @Roles | Keycloak realm/application roles. | | @TokenScopes | Required OAuth scopes on the access token. |

Multi tenant configuration

Setting up for multi-tenant is configured as an option in your configuration:

{
  // Add /auth for older keycloak versions
  authServerUrl: 'http://localhost:8180/', // will be used as fallback
  clientId: 'nest-api', // will be used as fallback
  secret: 'fallback', // will be used as fallback
  multiTenant: {
    resolveAlways: true,
    realmResolver: (request) => {
      return request.get('host').split('.')[0];
    },
    realmSecretResolver: (realm, request) => {
      const secrets = { master: 'secret', slave: 'password' };
      return secrets[realm];
    },
    realmClientIdResolver: (realm, request) => {
      const clientIds = { master: 'angular-app', slave: 'vue-app' };
      return clientIds[realm];
    },
    // note to add /auth for older keycloak versions
    realmAuthServerUrlResolver: (realm, request) => {
      const authServerUrls = { master: 'https://master.local/', slave: 'https://slave.local/' };
      return authServerUrls[realm];
    }
  }
}

Admin callback endpoints

This module mounts Keycloak admin callback endpoints:

  • POST /k_push_not_before
  • POST /k_logout

Purpose:

  • Accepts signed Keycloak admin callbacks with action PUSH_NOT_BEFORE.
  • Updates token revocation cutoff (notBefore) used by OFFLINE validation.
  • Stores notBefore per realm URL, so one realm update does not affect another realm in multi-tenant setups.
  • Accepts signed OIDC back-channel logout tokens and revokes token usage by sid and/or sub.

Realm resolution for callback verification:

  1. multiTenant.realmResolver(request) when configured
  2. Single-tenant configured realm (realm)

k_logout here is callback-only revocation handling for bearer tokens. It does not add browser/session middleware flows.

Error handling

All errors thrown by the library extend KeycloakAuthError, so you can catch any library error with a single instanceof check:

import {
  KeycloakAuthError,
  KeycloakConfigError,
  KeycloakTokenError,
  KeycloakPermissionError,
  KeycloakAdminError,
} from 'nestjs-keycloak-auth';

| Error class | Code | When | | ------------------------ | --------------------------- | -------------------------------------------------------- | | KeycloakAuthError | KEYCLOAK_AUTH_ERROR | Base class — catches all library errors via instanceof | | KeycloakConfigError | KEYCLOAK_CONFIG_ERROR | Missing config, invalid options, file not found | | KeycloakTokenError | KEYCLOAK_TOKEN_ERROR | Malformed JWT, grant validation failure, JWKS key miss | | KeycloakPermissionError| KEYCLOAK_PERMISSION_ERROR | UMA permission check failure | | KeycloakAdminError | KEYCLOAK_ADMIN_ERROR | Admin callback signature/token verification failure |

Guards continue to throw standard NestJS UnauthorizedException / ForbiddenException at the HTTP boundary.

Example project

The example/ folder contains a complete working NestJS application with:

  • Docker Compose setup (Keycloak + PostgreSQL + NestJS API)
  • Pre-configured Keycloak realm exports (single tenant + two tenants)
  • Postman collection for testing all endpoints
  • Product CRUD controller demonstrating @Resource, @Scopes, @ConditionalScopes, @Roles, @EnforcerOptions, and UMA response modes

See example/README.md for setup and usage instructions.

Testing

npm test
npm run test:cov

Current test setup uses Jest + ts-jest and is configured to enforce 100% global coverage thresholds.

Configuration options

Nest Keycloak Options

| Option | Description | Required | Default | | ----------------- | -------------------------------------------------------------------------- | -------- | ---------- | | policyEnforcement | Sets the policy enforcement mode | no | PERMISSIVE | | tokenValidation | Sets the token validation method | no | ONLINE | | multiTenant | Sets options for multi-tenant configuration | no | - | | roleMerge | Sets the merge mode for @Roles decorator | no | OVERRIDE | | backchannelLogoutTtlMs | TTL for in-memory back-channel logout revocation entries in milliseconds | no | 86400000 |

Common Keycloak Config Fields

| Option | Description | | ------------------------------ | ------------------------------------------------------ | | realm | Realm name | | clientId / client-id | Client ID (or resource) | | secret / credentials.secret | Client secret (confidential clients) | | authServerUrl / serverUrl | Keycloak base URL | | bearerOnly / bearer-only | Marks bearer-only behavior | | public / public-client | Public client mode | | realmPublicKey | Static realm public key for OFFLINE validation | | verifyTokenAudience | Enables strict audience check in OFFLINE validation | | minTimeBetweenJwksRequests | JWKS retry throttle |

Multi Tenant Options

| Option | Description | Required | Default | | -------------------------- | --------------------------------------------------------------------------------------------------------- | -------- | ------- | | resolveAlways | Always resolve realm config instead of using cached values | no | false | | realmResolver | Resolves realm from request | yes | - | | realmSecretResolver | Resolves secret by realm (and optional request) | no | - | | realmAuthServerUrlResolver | Resolves auth server URL by realm (and optional request) | no | - | | realmClientIdResolver | Resolves client ID by realm (and optional request) | yes | - |

Contributing

See CONTRIBUTING.md for development setup and guidelines.

Security

To report a vulnerability, see SECURITY.md. Do not open a public issue.

Acknowledgements

Inspired by nest-keycloak-connect by John Joshua Ferrer and the official keycloak-nodejs-connect adapter.

License

MIT