Token-Based Authentication #28
Labels
No Label
client
server
user made
L
M
S
XL
bug
bugfix
discussion
documentation
feature
maintenance
postponed
refactoring
wontfix
No Milestone
No Assignees
2 Participants
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: zdm/envoy#28
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
At the current point, people who have access to run configurations are the only ones who can automatically log-in.
While you could write your own Bash function that supplies the command line arguments, most users will not know about that option yet.
So, we need a mechanism so that even normal humans can log-in without always having to see the login scene.
Obviously, we cant just save the users login credentials somewhere on his machine. The current autologin mechanism through the config is just a utility for developers, because passing a password to an application as a commandline parameter is highly insecure.
Instead, the server could generate an authentication token after a successful login, which can then be used to log in that user for a certain amount of time. On subsequent logins, the client can send just the token, which can be stored on the users machine.
While this is the standard way of persisting a users authentication on a machine, we might get a problem with local database encryption, as the password might not entered on application startup and the token is saved unencrypted.
Once this is implemented, we can ditch the current autologin mechanism, as token based authentication can also be used during development.
Autologin mechanismto Token-Based Authentication