Skip to main content

User Context in Marketplace Apps

HighLevel provides a secure mechanism for accessing authenticated user information through signed tokens. This guide explains how you can generate and use Shared Secret key to access user context in secured manner.

Setting Up Shared Secret

Generating a Shared Secret Key

First you'll need to generate a Shared Secret key for your application:

  1. Navigate to your application's Advanced Settings
  2. Go to the Auth section
  3. Under Shared Secret, click the Generate button to create your Shared Secret key
Shared Secret Key Generation

Frontend Implementation Methods

There are two ways in which you can access this data in your frontend, depending on where your code runs:

1. Custom JavaScript Implementation

If you're using custom JavaScript injected into HighLevel pages, use the exposeSessionDetails method:

async function getUserData() {
try {
// APP_ID is your application's unique identifier
const encryptedUserData = await window.exposeSessionDetails(APP_ID)

// Send this encrypted data to your backend for decryption
const response = await fetch('your-backend-endpoint', {
method: 'POST',
headers: {
'Content-Type': 'application/json'
},
body: JSON.stringify({ encryptedData: encryptedUserData })
})

const userData = await response.json()
return userData
} catch (error) {
console.error('Failed to fetch session details:', error)
throw error
}
}

2. Custom Pages Implementation

If you're trying to get user context in custom page, use the postMessage method to communicate with the parent window:

async function getUserData() {
try {
const encryptedUserData = await new Promise((resolve) => {
// Request user data from parent window
window.parent.postMessage({ message: 'REQUEST_USER_DATA' }, '*')

// Listen for the response
const messageHandler = ({ data }) => {
if (data.message === 'REQUEST_USER_DATA_RESPONSE') {
window.removeEventListener('message', messageHandler)
resolve(data.payload)
}
}

window.addEventListener('message', messageHandler)
})

// Send encrypted data to your backend for decryption
const response = await fetch('your-backend-endpoint', {
method: 'POST',
headers: {
'Content-Type': 'application/json'
},
body: JSON.stringify({ encryptedData: encryptedUserData })
})

const userData = await response.json()
return userData
} catch (error) {
console.error('Failed to fetch user data:', error)
throw error
}
}

Backend Implementation

Regardless of which frontend method you use, the backend decryption process remains the same:

const CryptoJS = require('crypto-js')

function decryptUserData(encryptedUserData, sharedSecretKey) {
try {
const decrypted = CryptoJS.AES.decrypt(encryptedUserData, sharedSecretKey).toString(CryptoJS.enc.Utf8)
return JSON.parse(decrypted)
} catch (error) {
throw new Error('Failed to decrypt user data')
}
}

// Example Express endpoint
app.post('/decrypt-user-data', (req, res) => {
try {
const { encryptedData } = req.body
const userData = decryptUserData(encryptedData, process.env.GHL_APP_SHARED_SECRET)
res.json(userData)
} catch (error) {
res.status(400).json({ error: 'Failed to decrypt user data' })
}
})

Decrypted Data Structure

After decryption, the data will be returned as a JSON object containing user information. The structure varies based on whether the user is accessing from an Agency or Location context.

Agency Context

When accessing from an Agency context, the decrypted data will have the following structure:

{
"userId": "MKQJ7wOVVmNOMvrnKKKK", // Unique identifier for the user
"companyId": "GNb7aIv4rQFVb9iwNl5K", // Unique identifier for the company/agency
"role": "admin", // User's role in the system
"type": "agency", // Indicates this is an agency user
"userName": "John Doe", // Full name of the user
"email": "[email protected]" // User's email address
}

Location Context

When accessing from a Location context, the decrypted data will include an additional activeLocation field:

{
"userId": "MKQJ7wOVVmNOMvrnKKKK", // Unique identifier for the user
"companyId": "GNb7aIv4rQFVb9iwNl5K", // Unique identifier for the company/agency
"role": "admin", // User's role in the system
"type": "agency", // Indicates this is an agency user
"activeLocation": "yLKVZpNppIdYpah4RjNE", // Unique identifier for the active location
"userName": "John Doe", // Full name of the user
"email": "[email protected]" // User's email address
}

Field Descriptions

FieldTypeDescription
userIdstringUnique identifier for the user
companyIdstringUnique identifier for the company/agency
rolestringUser's role in the system (e.g., 'admin', 'user')
typestringContext type ('agency' or 'location')
activeLocationstring(Location context only) Unique identifier for the active location
userNamestringFull name of the user
emailstringUser's email address

Reference Implementation

For a complete example implementation, you can refer to our marketplace app template repository:

GoHighLevel Marketplace App Template

The relevant implementation can be found in the /decrypt-sso endpoint of the template.

Security Considerations

  • Never expose your Shared Secret key in client-side code
  • Always perform decryption on your backend
  • Store your Shared Secret key securely using environment variables
  • Use HTTPS for all communications between your frontend and backend
  • Regularly rotate your Shared Secret keys for enhanced security