Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authentication & Authorization: Ability to request API key #134

Open
proycon opened this issue Aug 29, 2022 · 2 comments
Open

Authentication & Authorization: Ability to request API key #134

proycon opened this issue Aug 29, 2022 · 2 comments
Assignees
Labels
FAIR Distribution & Deployment FAIR Distribution & Deployment

Comments

@proycon
Copy link
Member

proycon commented Aug 29, 2022

In order for automated clients to connect to the CLARIAH authentication backend (satosa), we need a well-established and documented mechanism for developers to request an API/authorization key. For instance via a simple web front-end.

This also relates to the issue of user delegation #65 , though I can imagine authorization keys themselves may be independent of any actual users and tied to particular clients;

@proycon proycon added the FAIR Distribution & Deployment FAIR Distribution & Deployment label Aug 29, 2022
@proycon
Copy link
Member Author

proycon commented Sep 8, 2022

As @hayco commented in a KNAW HuC Team Text meeting recently, the way I wrote this may be a bit too narrowly defined as it gives the impression it's just about a front-end, which is not the case: the whole authentication backend must be able to accommodate access from automated tools (some may not act on behalf of any particular user).

@menzowindhouwer
Copy link
Contributor

menzowindhouwer commented Sep 8, 2022

In KNAW HuC Structured Data we're busy to document/develop 3 scenarios:

  1. regular service behind Satosa browser login
  2. delegated service receiving a Sotasa token
  3. service receiving an API ky

In all these cases Authentication must be valid and Authorization decisions can be based on the same info, i.e. regardless of the scenario authentication has happened. Authorization info is a fallback chain of (salted & hashed) EPPN or EPTID.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
FAIR Distribution & Deployment FAIR Distribution & Deployment
Development

No branches or pull requests

4 participants