Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User settings service #2

Open
erikvullings opened this issue Oct 7, 2018 · 1 comment
Open

User settings service #2

erikvullings opened this issue Oct 7, 2018 · 1 comment
Assignees

Comments

@erikvullings
Copy link
Contributor

Use OAuth and Passport js to create a user authN service.

@erikvullings erikvullings self-assigned this Oct 7, 2018
@cdanger
Copy link
Member

cdanger commented Jun 29, 2019

We'd better have a central user authn service and SSO (OpenID Connect), because we need user authN also for the Admin Tool and AAR... at least (and any other web frontend that allows users/admins to modify the testbed state or view sensitive data).

I can setup a Keycloak web authentication/SSO server as part of the testbed, or on some public TNO VM, for the central auth service. Or maybe you already have one at TNO? This is free and open source product so you can have it locally for your own tests as well.

Then make sure your webapp works properly behind a reverse proxy like Apache/Traefik (see issue on SSL reverse proxy support). Then the SSO authentication is done in the reverse proxy and your webapp gets all needed auth info via HTTP headers, also called pre-authentication mode in some web frameworks. If this doesn't work (worst case scenario), you may have to support OpenID Connect in your webapp natively.

For the record, similar issue here:
DRIVER-EU/after-action-review#22

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants