Shared Code for Login Users and Management: Difference between revisions

From GO Wiki
Jump to navigation Jump to search
No edit summary
Line 1: Line 1:
=Implementation=
At this point, we've decided to go BrowserID for authentication and a standardized JSON file for authorization.
==Authentication==
We've
https://browserid.org/
http://accordion.lbl.gov/cgi-bin/browserid/secret
http://geneontology.svn.sourceforge.net/viewvc/geneontology/installations/browserid/secret?view=log
=Discussion points=
=Discussion points=



Revision as of 19:04, 28 September 2011

Implementation

At this point, we've decided to go BrowserID for authentication and a standardized JSON file for authorization.

Authentication

We've https://browserid.org/

http://accordion.lbl.gov/cgi-bin/browserid/secret

http://geneontology.svn.sourceforge.net/viewvc/geneontology/installations/browserid/secret?view=log


Discussion points

Wish list

Interchangeable backends

An implementation should have the ability to run off of the local filesystem (for a smaller group sized app) or communicate with a remote third-party server. To some extent, the former may be more important.

Also, we don't want to get locked into depending on a third-party for access (and neither should people downstream from us).

Reusable user identities

A person could have a single login across multiple GO applications. Similarly, if somebody did implement their own backend server, they'd be able to use it for single identities across multiple pieces of our software (or use it as a base for their own).

Simple management

It would be nice if there was an easy easy to add and drop users, as well as control what permissions they had for applications that used this system.

Also, role-based users would be a good way to handle application permissions.

Question: How many roles are envisaged? I can think of three: user (can use designated apps), admin (can add/drop users, give/revoke permission to use apps) and admin (can do everything). Do we need more than that? Fewer?

Simple implementation (many languages)

It would be very nice if this was not locked into a single language. This would either mean that is relatively easy and has been implemented many times with a lot of client and server libraries (like OpenID) or had a web API that makes it easy to interoperate with alien software.

Easy maintenance

The simpler the implementation the better. A layer of software and a small sqlite3 database that can be easily copied = good. Multiple high-availability servers needing synchronized clocks = bad.

One-stop shopping

It would be nice to handle everything through a single unified interface (thinking about Drupal users and permissions here).

Risks

Things that we're particularly worried about in an implementation.

Accidental exposure

This would cover things like web crawlers somehow finding an "erase all" link

Hacking

I think in general we're not super worried about security (for example, a man in the middle after login was something that got a lot of shrugs), but want the general bases covered. As we're not security experts, reusing a tested stack by somebody else would be nice.

Other practical concerns

We're not super happy about running and maintaining a database for logins. But this can be punted for now as we want local use and the immediate applications are of such small scope.

Packages considered

Login/Authentication Roles/Auth Notes
OpenID OAuth Unsure how to tie together and handle management. Running our own OpenId server we could have local control of sign-on but also allow entry from other OpenId providers (eg, Google). We would then not be dependent on a 3rd party but would have the convenience of the 3rd party for people who are already signed on from said 3rd party. There are implementations in numerous languages of both the server and client. My reading of OAuth seems like it's intended for different servers to exchange data without forcing the User to sign onto both. It could could probably be used for role regulation, but might be overkill.
Drupal Seems heavy when all we would want is the user code
LDAP ...
Stanford WebAuth Cookie-based; open source; requires Apache and Kerberos or LDAP
Central Authentication Service Enterprise level single sign-on; open source; java server and client libraries for Apache, Drupal, Java, PAM, PHP, Perl, Ruby, etc.

Consumers

  • GOLD database administration
  • TermGenie