Hi Jean,


Jean-Baptiste BRIAUD -- Novlog wrote:
> 
> How do you manage authentication of user on stateless servers environment
> ?
> 

The most simple (and probable most effective) method is using HTTP
authentication. This causes the client to send the authentication
information with each request, and the server one needs to check the
information with its database. Most (at least all major) web servers support
this authentication scheme.

This may have a few lacunas (and workarounds) though:
 * It's hard to force a logout, as the browser (by default) caches the
credentials provided in the first authentication prompt. But there are ways
[1] to "help" the browser forgetting about them...
 * Some people say it's not very secure as the credentials are send to the
server in a weak encryption format. This can be worked around using digest
authentication, though some simpler (mobile/older) browsers don't support
it. Also, one can (and should) force the use of HTTPS in high security
environments.



Jean-Baptiste BRIAUD -- Novlog wrote:
> 
> 1. Login
> So, I have a form to ask for login/pass to end-user, then it hash the pass
> and send login/hashedpass to the server.
> On server side, we can check that this end-user is authorized.
> 

The default login prompt usually can't be personalized (it's created by the
browser), although there are some tricks [2] which basically consist in
capturing the credentials and send the first request using an AJAX approach
with the authentication information.



Jean-Baptiste BRIAUD -- Novlog wrote:
> 
> 2. Using the server
> Now I send a request to do some business, how do you ensure that RPC
> request correspond to an authenticated end-user ?
> 

The web server takes care of that, and using its API you may fetch who is it
if some operations are reserved to some users...



Jean-Baptiste BRIAUD -- Novlog wrote:
> 
> * Are you also doing something on client side with that cookie ?
> 
> * Could that be as simple as copy/paste the cookie to another machine to
> bypass security ?
> How do you protect against that copy/past attack ?
> 
> * How do you protect, if you protect, against javascript or more generally
> against client-side hacking : DOM modification, javascript modification,
> ...
> 

As far as I know, HTTP authentication doesn't suffer from this kind of
attacks...



Jean-Baptiste BRIAUD -- Novlog wrote:
> 
> * Don't forget that due to good qooxdoo RPC design, requests are
> individually asynchronous and sent in parallel, and we are using that
> heavily.
> I add that because apparently, adding some random and/or crypted value to
> the RPC request that the server would eventually controlled doesn't work.
> This is because you can't ensure that all RPC thread will share the value
> changed on the server side.
> 

HTTP-based authentication is managed by the browser, therefore no worries
regarding client-server communication.


Hope this helps,
 Helder


[1] http://www.berenddeboer.net/rest/authentication.html#permanent-logout
[2] http://www.berenddeboer.net/rest/authentication.html#login-page
-- 
View this message in context: 
http://old.nabble.com/authentication-tp26323410p26373154.html
Sent from the qooxdoo-devel mailing list archive at Nabble.com.


------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
_______________________________________________
qooxdoo-devel mailing list
qooxdoo-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/qooxdoo-devel

Reply via email to