-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update authentication and authorization docs #267
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,8 @@ | ||
# Authentication | ||
To ensure that only authorized users access your VulcanSQL application, it's essential to identify who sends the request. This process, called authentication, typically involves validating credentials such as tokens, cookies, or other forms of identification. | ||
|
||
In VulcanSQL, `Authenticators` handle this process, either by validating the credentials themselves or by querying third-party authentication providers. Once the authentication process is complete, additional user attributes are also added to the request for further processing. These attributes can include user names, departments, groups, statuses, and more, depending on the specific authenticator used. | ||
In VulcanSQL, `Authenticators` handle this process, either by validating the credentials themselves or by querying third-party authentication providers. Once the authentication process is complete, additional user attributes are also added to the request for further processing. | ||
These attributes can include user names, departments, groups, statuses, and more, and they are used for [authorization](./authz). | ||
|
||
## Authenticators | ||
To enable authenticators in VulcanSQL, set `auth.enabled` to true in your `vulcan.yaml` configuration file: | ||
|
@@ -15,8 +16,163 @@ VulcanSQL offers a range of built-in authenticators, each with its unique method | |
|
||
Here is a list of built-in authenticators available in VulcanSQL: | ||
|
||
* **HTTP Basic**: Authenticate users via HTTP basic authentication. This method requires users to provide a username and password, which are transmitted as headers in each request. | ||
* **Password File**: Validate users' credentials using a password file. This method involves comparing the provided username and password against a pre-defined list of authorized users stored in a file. | ||
* **Simple Token**: Authenticate users with a static token. This method involves checking the provided token against a pre-configured token value. | ||
* [**HTTP Basic**](#http-basic): Authenticate users via HTTP basic authentication. This method requires users to provide a username and password, which are transmitted as headers in each request. | ||
* [**Password File**](#password-file): Validate users' credentials using a password file. This method involves comparing the provided username and password against a pre-defined list of authorized users stored in a file. | ||
* [**Simple Token**](#simple-token): Authenticate users with a static token. This method involves checking the provided token against a pre-configured token value. | ||
|
||
By implementing the appropriate authenticators for your VulcanSQL application, you can ensure that only authorized users access your system and protect sensitive data from unauthorized access. | ||
|
||
## HTTP Basic | ||
|
||
With HTTP basic authentication, VulcanSQL authenticates users via [HTTP Basic Authentication](https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication). | ||
|
||
### Configuration | ||
|
||
Please fill out the values in your `vulcan.yaml`. | ||
|
||
```yaml | ||
auth: | ||
enabled: true | ||
options: | ||
basic: | ||
# Read users and passwords from a text file. | ||
htpasswd-file: | ||
path: passwd.txt # Path to the password file. | ||
users: # (Optional) Add attributes for users | ||
- name: eason | ||
attr: | ||
department: engineer | ||
``` | ||
|
||
### Password file | ||
|
||
You need to create a password file in format `<username>:<md5-password>`, one user per line. For example: | ||
|
||
:::info | ||
You can use `echo -n '<password>' | md5sum` to generate an md5 string | ||
::: | ||
|
||
```txt | ||
eason:202cb962ac59075b964b07152d234b70 | ||
andy:202cb962ac59075b964b07152d234b70 | ||
``` | ||
|
||
If you want to add some attributes for these users, you can set them in `vulcan.yaml`. For example, | ||
|
||
```yaml | ||
auth: | ||
enabled: true | ||
options: | ||
basic: | ||
htpasswd-file: | ||
path: passwd.txt | ||
users: | ||
- name: eason | ||
attr: | ||
department: engineer | ||
``` | ||
|
||
This config adds `department=engineer` for user "eason", but adds no attribute to user "andy". | ||
|
||
### Providing credentials to HTTP Header | ||
|
||
You need to add a header `Authorization: basic base64(<username>:<password>)` when sending requests, for example, sending requests with username "ivan" and password "123". | ||
|
||
```shell | ||
curl -H "Authorization: basic aXZhbjoxMjM=" http://localhost:3000/api/customer | ||
``` | ||
|
||
## Password File | ||
|
||
VulcanSQL authenticates users via HTTP header with a password file. | ||
|
||
### Configuration | ||
|
||
```yaml | ||
auth: | ||
enabled: true | ||
options: | ||
password-file: | ||
path: passwd.txt | ||
users: | ||
- name: eason | ||
attr: | ||
department: engineer | ||
``` | ||
|
||
### Password file | ||
|
||
You need to create a password file in format `<username>:<bcrypt-password>`, one user per line. For example: | ||
|
||
``` | ||
eason:$2y$10$PRK6uQ52bYNPdiz4V0XtQel/Pyr8DRCvoTATcGqW5mukv7J3uvebC | ||
andy:$2y$10$evKAprboGgLdPPeODt4n6.PTA9Iy0h1tltx5Dc1ZaIZVfBd2K1xqy | ||
``` | ||
|
||
This file provides two users "eason and "andy with password "123”. | ||
|
||
:::info | ||
To generate bcrypt-password, you can use htpasswd command, for example, to generate user "andy and password "123”: | ||
|
||
```bash | ||
htpasswd -bnBC 10 "andy" 123 | ||
``` | ||
::: | ||
|
||
If you want to add some attributes for these users, you can set them in `vulcan.yaml`. For example, | ||
|
||
```yaml | ||
auth: | ||
enabled: true | ||
options: | ||
password-file: | ||
path: passwd.txt | ||
users: | ||
- name: andy | ||
attr: | ||
department: engineer | ||
``` | ||
|
||
This config adds `department=engineer` for user "andy, but adds no attribute to user "eason". | ||
|
||
### Providing credentials to HTTP Header | ||
|
||
You need to add a header `Authorization: password-file base64(<username>:<password>)` when sending requests. For example, sending requests with username "andy” and password "123”. | ||
|
||
```shell | ||
curl -H "Authorization: password-file YW5keToxMjM=" http://localhost:3000/api/customer | ||
``` | ||
|
||
## Simple Token | ||
|
||
### Configuration | ||
|
||
```yaml | ||
auth: | ||
enabled: true | ||
options: | ||
simple-token: | ||
- name: eason # User name | ||
token: some-secret # Token to authenticate | ||
attr: # (optional) attributes for this user | ||
department: engineer | ||
- name: andy | ||
token: another-secret | ||
attr: | ||
department: engineer | ||
``` | ||
|
||
Simple token authenticator requires a user list. You must set the name and token for each user, and give them some optional attributes. | ||
|
||
:::caution | ||
The token for each user must be different; otherwise, the last configured user overrides all the previous ones. | ||
|
||
::: | ||
|
||
### Providing credentials to HTTP Header | ||
|
||
You need to add a header `Authorization: sample-token <token>` when sending requests, for example, sending requests with the token “another-secret”. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Found the typo, |
||
|
||
```shell | ||
curl -H "Authorization: simple-token another-secret" http://localhost:3000/api/customer | ||
``` |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -43,3 +43,15 @@ The configurations for each data source are defined in the `profiles.yaml` file. | |
group: 'admin*' | ||
enabled: 'true' | ||
``` | ||
|
||
## Set the allowed profiles to each template | ||
|
||
For every SQL template, we need to tell VulcanSQL what profiles they could use by adding `profiles` property on the schema. | ||
From top to bottom, users use the first qualified profile. If users can't use any of them, 403 error will be thrown. | ||
|
||
```yaml | ||
urlPath: /customer | ||
profiles: | ||
- pg-admin | ||
- pg-non-admin | ||
``` | ||
Comment on lines
+52
to
+57
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Should we also let users know that we could set multiple profiles, but in the SQL file, only could access one data source? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How about also adding the
user-list
section to complete the setting method? See: https://vulcan-sql-document-git-chore-bump-to-040-vulcan-sql-document.vercel.app/docs/api-building/access-control/authenticators/http-basic#user-listThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After a discussion with @cyyeh, we won't add the content to the document.