Skip to main content

Documentation Index

Fetch the complete documentation index at: https://launchdarkly-preview.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

Overview

This topic explains how to use the secure mode feature to safely evaluate feature flags in a web browser.

About secure mode

Secure mode ensures that customers’ feature flag evaluations are kept private in web browser environments, and that one end user cannot inspect the variations for another end user. On an insecure device, a malicious end user could use a context or user key to identify what flag values another end user receives by analyzing the results of multiple flag evaluations. Secure mode prevents you from doing an evaluation for a context or user key that hasn’t been signed on the backend. Secure mode is available for communication between the following JavaScript-based SDKs and LaunchDarkly:
  • Electron
  • JavaScript
  • Node.js (client-side)
  • React Web
Secure mode is not necessary for server-side SDKs.

How secure mode works

Secure mode works when you configure your JavaScript-based SDK to include a server-generated HMAC SHA256 hash of your context key or user key. This hash is signed with the SDK key for your environment. Enabling secure mode means that every request coming from a client-side JavaScript-based SDK requires the secure mode hash to evaluate flag variations. You can pass this to your front-end code with the mechanism of your choice, such as bootstrapping or as a template variable. To use secure mode, you must complete the following:
  1. Enable secure mode for each environment: You can enable secure mode by editing each of your environments from the Environments list of your project in the LaunchDarkly user interface. Secure mode is an environment-wide setting. You can enable secure mode for your environment even if you’re also using SDKs other than JavaScript. Enabling secure mode does not cause those SDKs to fail.
  2. Configure your server-side or edge SDK to generate the secure mode hash: Most LaunchDarkly server-side and edge SDKs include a method to compute the secure mode hash for a key. Alternatively, you can compute the hash yourself. To learn how, read Compute the hash manually. If at any time you reset an environment’s SDK key, you will need to regenerate the secure mode hash.
  3. Send the computed secure mode hash for the context or user to LaunchDarkly: Include the secure mode hash when requesting flag evaluations. The JavaScript-based SDK will send the context or user key and the hash to LaunchDarkly. If the hash doesn’t match, LaunchDarkly returns an error.
You can enable secure mode at any time when you use LaunchDarkly SDKs. As a best practice, we recommend that you enable secure mode during initial SDK configuration, because late-stage changes to your SDK configuration may have negative interactions with other settings.
To learn more about the secure mode hash process, read How to verify secure mode hash.
A context is a generalized way of referring to the people, services, machines, or other resources that encounter feature flags in your product. Contexts replace another data object in LaunchDarkly: “users.” To learn more, read Contexts.Creating contexts and evaluating flags based on them is supported in the latest major versions of most of our SDKs. For these SDKs, the code samples on this page include the two most recent versions.

Generate a secure mode hash

Details about generating a secure mode hash are available in the SDK-specific sections below:

Server-side SDKs

You can use the following server-side SDKs to generate a secure mode hash:

.NET (server-side)

The SecureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      var hash = client.SecureModeHash(context);

Go

The SecureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      // There is not a SecureModeHash method in the LDScopedClient,
      // so you need to access the method from the LDClient.
      // Then, pass in the scoped client's current context.
      // LDScopedClient is in beta and may change without notice.
      scopedClient.Client().SecureModeHash(scopedClient.CurrentContext())

Haskell

The secureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      secureModeHash client context

Java

The secureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      client.secureModeHash(context);

Node.js (server-side)

The secureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      client.secureModeHash(context);

PHP

The secureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      $hash = $client->secureModeHash($context);

Python

The SecureModeHash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      hash = ldclient.get().secure_mode_hash(context)

Ruby

The secure_mode_hash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      client.secure_mode_hash(context)

Rust

The secure_mode_hash method computes an HMAC signature of a context signed with the client’s SDK key.Here is the method:
      match client.secure_mode_hash(&context) {
          Ok(hash) => println!("Hash: {}", hash),
          Err(e) => eprintln!("Failed to compute hash: {}", e),
      }

Edge SDKs

You can use the following edge SDKs to generate a secure mode hash:

Cloudflare

The secureModeHash method computes an HMAC signature of a context signed with the SDK key.Here is the method:
      const hash = client.secureModeHash(context);

Fastly

The secureModeHash method computes an HMAC signature of a context signed with the SDK key.Here is the method:
      const hash = client.secureModeHash(context);

Vercel

The secureModeHash method computes an HMAC signature of a context signed with the SDK key.Here is the method:
      const hash = client.secureModeHash(context);

Compute the hash manually

To compute the hash manually, locate the server-side SDK key for your environment on the Environments list for your project in the LaunchDarkly user interface. Then, compute an HMAC SHA256 hash of the UTF-8 encoding of your context key, using the UTF-8 encoding of your SDK key as a secret, and convert the hash to a hexadecimal string. Here is a .NET (server-side) example:
    using System;
    using System.Security.Cryptography;
    using System.Text;

    var encoding = new UTF8Encoding();
    var keyBytes = encoding.GetBytes("YOUR_SDK_KEY");
    var hmacSha256 = new HMACSHA256(keyBytes);
    var hashBytes = hmacSha256.ComputeHash(encoding.GetBytes("example-context-key"));
    var hashString = BitConverter.ToString(hashBytes).Replace("-", "").ToLower();

Configure secure mode in Java

Script-based SDKs To use secure mode, you must generate the hash based on a unique identifier for the context. This unique identifier is called a “canonical key” and is a concatenation of the kind and key attributes, separated by a colon (:). For example, if a user context has a key of “example-user-key,” this means you must generate the hash using a canonical key of user:example-user-key. If the context is a multi-context, the canonical key must include the key and kind attribute for each context kind. For example, if a multi-context contains an organization context kind and a user context kind, and they have the keys “example-organization-key” and “example-user-key”, the canonical key is organization:example-organization-key:user:example-user-key. Secure mode is not compatible with the SDK’s ability to automatically generate keys for anonymous contexts because the SDK needs a correctly calculated hash value. To learn more, read Anonymous contexts and users. In JavaScript-based SDKs, send the computed secure mode hash for your context as the hash attribute in the LDOptions object during client initialization, and as the hash parameter if subsequently identifying new contexts. Specifying the computed secure mode hash is supported in the following client-side SDKs:

Electron

Here’s how to configure or send the computed secure mode hash:
      // client initialization
      const options = {
        hash: 'example-server-generated-hash',
      };
      const client = LDClient.initialize('example-client-side-id', user, options);

      // identification of new user
      client.identify(newUser, hash, function() {
        console.log("New user's flags available");
      });

      // identification of new user, with a Promise
      client.identify(newUser, hash).then(() => {
        console.log("New user's flags available");
      });

Java

Script
Here’s how to configure or send the computed secure mode hash:
      // client initialization
      const options = {
        hash: 'example-server-generated-hash',
      };
      const client = LDClient.initialize('example-client-side-id', context, options);

      try {
        await client.waitForInitialization(5);
        // proceed with successfully initialized client

        // identification of new contexts
        client.identify(newContext, hash, function() {
          console.log("New context's flags available");
        });

      } catch(err) {
        // Client failed to initialized or timed out
        // variation() calls return fallback values until initialization completes
      }

Node.js (client-side)

Here’s how to configure or send the computed secure mode hash:
      // client initialization
      const options = {
        hash: 'example-server-generated-hash',
      };
      const client = LDClient.initialize('example-client-side-id', context, options);

      // identification of new contexts
      client.identify(newContext, hash, function() {
        console.log("New context's flags available");
      });

      // identification of new contexts, with a Promise
      client.identify(newContext, hash).then(() => {
        console.log("New context's flags available");
      });

React Web

All context-related functionality provided by the JavaScript SDK is also available in the React Web SDK.