Handling requests with Node.js and Express
Node.js and Connect/Express Middleware
The Clerk Node SDK offers two authentication middlewares specifically for Express and Connect/Express compatible frameworks such as Gatsby and Fastify.
ClerkExpressWithAuth()
ClerkExpressWithAuth
is a lax middleware that returns an empty auth object when an unauthenticated request is made.
import "dotenv/config"; // To read CLERK_API_KEY import { ClerkExpressWithAuth } from "@clerk/clerk-sdk-node"; import express from "express"; const port = process.env.PORT || 3000; const app = express(); // Use the lax middleware that returns an empty auth object when unauthenticated app.get( "/protected-endpoint", ClerkExpressWithAuth({ // ...options }), (req, res) => { res.json(req.auth); } ); app.listen(port, () => { console.log(`Example app listening at http://localhost:${port}`); });
import "dotenv/config"; // To read CLERK_API_KEY import { ClerkExpressWithAuth, LooseAuthProp, WithAuthProp, } from '@clerk/clerk-sdk-node'; import express, { Application, Request, Response } from 'express'; const port = process.env.PORT || 3000; const app: Application = express(); declare global { namespace Express { interface Request extends LooseAuthProp {} } } // Use the lax middleware that returns an empty auth object when unauthenticated app.get( '/protected-route', ClerkExpressWithAuth({ // ...options }), (req: WithAuthProp<Request>, res: Response) => { res.json(req.auth); } ); app.use((err, req, res, next) => { console.error(err.stack); res.status(401).send('Unauthenticated!'); }); app.listen(port, () => { console.log(`Example app listening at http://localhost:${port}`); });
ClerkExpressRequireAuth()
ClerkExpressRequireAuth
is a strict middleware that raises an error when an unauthenticated request is made.
import "dotenv/config"; // To read CLERK_API_KEY import { ClerkExpressRequireAuth } from '@clerk/clerk-sdk-node'; import express from 'express'; const port = process.env.PORT || 3000; const app = express(); // Use the strict middleware that raises an error when unauthenticated app.get( '/protected-endpoint', ClerkExpressRequireAuth({ // ...options }), (req: RequireAuthProp<Request>, res) => { res.json(req.auth); } ); app.use((err, req, res, next) => { console.error(err.stack); res.status(401).send('Unauthenticated!'); }); app.listen(port, () => { console.log(`Example app listening at http://localhost:${port}`); });
import "dotenv/config"; // To read CLERK_API_KEY import { ClerkExpressRequireAuth, RequireAuthProp, StrictAuthProp, } from '@clerk/clerk-sdk-node'; import express, { Application, Request, Response } from 'express'; const port = process.env.PORT || 3000; const app: Application = express(); declare global { namespace Express { interface Request extends StrictAuthProp {} } } // Use the strict middleware that raises an error when unauthenticated app.get( '/protected-route', ClerkExpressRequireAuth({ // ...options }), (req: RequireAuthProp<Request>, res) => { res.json(req.auth); } ); app.use((err, req, res, next) => { console.error(err.stack); res.status(401).send('Unauthenticated!'); }); app.listen(port, () => { console.log(`Example app listening at http://localhost:${port}`); });
Express Error Handlers
Express comes with a default error handler for errors encountered in the middleware chain.
Developers can also implement their own custom error handlers as detailed in the Express error handling guide. An example error handler can be found above.
If you are using the strict middleware variant, the err
passed to your error handler will contain enough context for you to respond as you deem fit.
Middleware options
These options can be used with both ClerkExpressWithAuth
and ClerkExpressRequireAuth
.
Name | Type | Description |
---|---|---|
authorizedParties | string[] | Can be used to validate that the azp claim equals any of your known origins that are permitted to generate those tokens. This is an extra security check that we highly recommend that you do. For more information, refer to Manual JWT Verification.An example of the value you can pass is: ['http://localhost:4003', 'https://clerk.dev'] |
jwtKey | string | Clerk's JWT session token can be verified in a networkless manner using the JWT verification key. By default, Clerk will use our well-known JWKs endpoint to fetch and cache the key for any subsequent token verification. If you use the CLERK_JWT_KEY environment variable or the jwtKey option to supply the key, Clerk will pick it up and do networkless verification for session tokens using it. For more information, refer to Networkless Token Verification. |
onError | (error: ClerkAPIResponseError) => unknown | This function can act as a custom error handler tailored to the needs of your application. |