passport-cloudfoundry-openidconnect

0.1.2 • Public • Published

passport-cloudfoundry-openidconnect

Passport strategy for authenticating with Cloud Foundry open PaaS using OpenID-Connect.

OpenID-Connect

(From: http://openid.net/connect/)

What is OpenID Connect ?

OpenID Connect is a suite of lightweight specifications that provide a framework for identity interactions via REST like APIs. The simplest deployment of OpenID Connect allows for clients of all types including browser-based, mobile, and javascript clients, to request and receive information about identities and currently authenticated sessions. The specification suite is extensible, allowing participants to optionally also support encryption of identity data, discovery of the OpenID Provider, and advanced session management, including logout.

How is OpenID Connect different than OpenID 2.0?

OpenID Connect performs many of the same tasks as OpenID 2.0, but does so in a way that is API-friendly. OpenID Connect can also be extended to include more robust mechanisms for signing and encryption. Integration of OAuth 1.0a and OpenID 2.0 required an extension (called the OpenID/OAuth hybrid); in OpenID Connect, OAuth 2.0 capability is built into the protocol itself.

OpenID-Connect (my definition)

It's OAuth 2.0, but acts like an OpenID. i.e. App-developers implement it just like we would do for OAuth 2.0, but the consumer will see it work like an openID.

OpenID-Connect (High-level steps):

  1. Perform OAuth 2.0 as usual. And after authentication dance, your app will get an access_token, a refresh_token just like in OAuth 2.0 but in addition an extra token called token_id.

  2. Then, we must take the token_id and decode it & validate couple of things mentioned here OpenID draft-spec draft 22 id.token.validation

  3. After the validation, we make a call to an endpoint to get user's profile like: <openid-server>/userinfo end point.

BTW, the access_token you get won't be able to do anything other than get user's profile (open id aspect).

(I think they should have named it "OAuth-ID" :) )

CloudFoundry User Account and Authentication (UAA) Server

"The UAA is the identity management service for Cloud Foundry. It's primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well as various other management functions" - https://github.com/cloudfoundry/uaa

In essence, Cloud Foundry UAA provides mainly OAuth 2.0 but supports a slight-variation of OpenID-Connect and is easily extensible for other kinds of auth mechanisms.

High-level steps for UAA OpenID:

  1. Register your app to only have scope openid or during OAuth 2.0 dance, send {scope: 'oauth.2.0'}.

  2. Perform OAuth 2.0 as usual. And after authentication dance, your app will get an access_token, a refresh_token just like in OAuth 2.0 but in addition an extra token called token_id. access_token itself acts similar to token_id.

  3. Then, we must take the token_id access_token and decode it & validate couple of things mentioned here OpenID draft-spec draft 22 id.token.validation.

access_token (Before):
abc.123.456

Decode: Take everything after first "." (= "123.456") and do Base64-decode.

acess_token (After)
{"exp":1357672585,"user_name":"bla@yahoo.com","scope":["openid"],"email":"bla@yahoo.com","aud":["openid"],"jti":"123-c545-4775-ad27-123","user_id":"123-2c45-111-8f37-123","client_id":"YOUR_APP_ID"}

Validate client_id is actually your app's id. Expiration (exp) is at a later date. Issuer(iss) is UAA (not supported yet).

4.After the validation, we make a call to an endpoint to get user's profile like: <uaa-server>/userinfo end point.

Notes:
  • The access_token you get won't be able to do anything other than get user's profile (open id aspect).
  • This passport-cloudfoundry-openidconnect already does all these things for you.
  • Accurate as of Jan 8th 2012.

CloudFoundry.com 's default endpoints####

For more, please refer:####

UAA related blogs

UAA API details & Github

OpenID Connect


passport-cloudfoundry-openidconnect Installation

$ npm install passport-cloudfoundry-openidconnect

Usage

Configure Strategy

The CloudFoundry authentication strategy authenticates users using a CloudFoundry account and OAuth 2.0 tokens. The strategy requires a verify callback, which accepts these credentials and calls done providing a user, as well as options specifying a client ID, client secret, and callback URL.

var CloudFoundryStrategy = require('passport-cloudfoundry-openidconnect').Strategy;
 
 
var cfStrategy = new CloudFoundryStrategy({
    clientID: CF_CLIENT_ID,
    clientSecret: CF_CLIENT_SECRET,
    callbackURL: CF_CALLBACK_URL
}, function(accessToken, refreshToken, profile, done) { //verify callback
    // asynchronous verification, for effect...
    process.nextTick(function() {
 
        // To keep the example simple, the user's CloudFoundry profile is returned to
        // represent the logged-in user.  In a typical application, you would want
        // to associate the CloudFoundry account with a user record in your database,
        // and return that user instead.
        return done(null, profile);
    });
});
 
//****************************************
// Examples 2 (w/ 'state' parameter):
//****************************************
 
var CloudFoundryStrategy = require('passport-cloudfoundry-openidconnect').Strategy;
var cfStrategy = new CloudFoundryStrategy({
    clientID: '123-456-789',
    clientSecret: 'shhh-its-a-secret'
    callbackURL: 'https://myapp.cloudfoundry.com/auth/cloudfoundry/callback',
    passReqToCallback: true //<---- Pass this to get req (as 1st param)from CF.com to callback
  },
  function(req, accessToken, refreshToken, profile, done) {
 
    //Verify things like 'state' in req.query (be sure to set: passReqToCallback=true)
    if(req.query.state === 'stateValueIpreviouslySent') {
        User.findOrCreate(..., function (err, user) {
           done(err, user);
       });
    } else {
       done({error: 'state value didnt match.. possible CSRF?'});
    }
  });
 
 
 // Set a callback to generate 'state' value.
 cfStrategy.setStateParamCallBack(generateState);
 
 Where.. 'generateState' generates new state and stores is somwhere
 and returns that random value back.
 
 // Temporarily store `state` ids
 var states = {};
 
 // Generates a random value to be used as 'state' param during authorization
  function generateStateParam() {
    var state = uuid.v4();
    states[state] = true;
    return state;
  }
 
 // Finally, in your 'finalCallback',check if that state exists
 if(req.query.state && states[req.query.state]) {
   done(null, user);
   //delete it from memory
   delete states[req.query.state];
 } else {
   done({"error": 'state value didn'match. possible CSRF?'})
 }
 
 // Pass the strategy
 passport.use(cfStrategy);
 

Express middlewares

In Express apps, you need to add the below middlewares. Also make sure to add them after Express' session middleware

// Initialize Passport!  Also use passport.session() middleware, to support
// persistent login sessions (recommended).
    app.use(passport.initialize());
    app.use(passport.session());

Express routes

For passport to work, you need to add two routes.

  1. app.get('/auth/cloudfoundry'… to start OAuth
  2. app.get('/auth/cloudfoundry/callback'… to receive OAuth callback back from Cloud Foundry.
* NOTE: This must match your callback url's path that you used to register the app.

For example, as route middleware in an Express application:

 
    app.get('/auth/cloudfoundry',
      passport.authenticate('cloudfoundry', {scope: 'openid'}),
      function(req, res){
        // The request will be redirected to CloudFoundry for authentication, so
        // this function will not be called.
      });
 
    app.get('/auth/cloudfoundry/callback',
      passport.authenticate('cloudfoundry', { failureRedirect: '/login' }),
      function(req, res) {
        // Successful authentication, redirect home.
        res.redirect('/');
      });
 
      w/ 'state' parameter (& verify/match it in the main callback to ensure no CSRF)
      app.get('/auth/cloudfoundry',
      passport.authenticate('cloudfoundry', {state: 'generateSomeRandomStateString'}),
      function(req, res){
        // The request will be redirected to CloudFoundry for authentication, so
        // this function will not be called.
      });

Logging out

To logout, call req.logout() AND cfStrategy.reset() like below:

app.get('/', function(req, res) {
    if(!req.user) {
        req.session.destroy();
        req.logout();
        cfStrategy.reset(); //required!
 
        return res.redirect('/login');
    }
    res.render('index', {
        user: req.user
    });
});

An Example OAuth2 App

The example app is located in the /examples folder. But here are the details.

Running the example app

  • Git clone this repo to passport-cloudfoundry-openidconnect folder (note npm install won't download examples, docs etc).
  • cd passport-cloudfoundry-openidconnect/examples/login
  • npm install
  • Open login/app.js and set CF_CLIENT_ID, CF_CLIENT_SECRET & CF_CALLBACK_URL
    • You will get these info when you register your app (see below).

//Set Cloud Foundry app's clientID
var CF_CLIENT_ID = '--insert-cloudfoundry-client-id-here--';

//Set Cloud Foundry app's clientSecret
var CF_CLIENT_SECRET = '--insert-cloudfoundry-client-secret-here--';

// Note: You should have a app.get(..) for this callback to receive callback from Cloud Foundry
// For example: If your callback url is: https://myKoolapp.cloudfoundry.com/auth/cloudfoundry/callback
// then, you should have a HTTP GET endpoint like: app.get('/auth/cloudfoundry/callback', callback))
//
var CF_CALLBACK_URL = '--insert-cloudfoundry--url--/auth/cloudfoundry/callback';
  • node app.js to run app on localhost:3000
    • PS: You should run this app at a pre-registered location that you provided during registering your app.
  • Open up browser & open the app.

Registering your app

  1. Register your app at Cloud Foundry at: http://support.cloudfoundry.com/
  2. Provide your app name. e.g. MyCoolApp
  3. Provide a app's server domain for callback. e.g. mycoolapp.cloudfoundry.com

App Workflow

Once the app is up and running, here is how it works:

1. You will see login page like below (Click on 'Login with Cloud Foundry' link):

2. Your browser will be redirected to https://login.cloudfoundry.com/login (default auth url):

3. If you Sign-in using your cloudfoundry.com account, you will see

4. If you Approve, browser will redirect you to your app w/ access_token & user info. And you will see:


Tests

$ npm install --dev
$ make test

Credits

License

(MIT) VMware

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Readme

Keywords

none

Package Sidebar

Install

npm i passport-cloudfoundry-openidconnect

Weekly Downloads

1

Version

0.1.2

License

MIT

Last publish

Collaborators

  • rajaraodv