Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

One-time token authentication #70

Closed
oberstet opened this issue Jun 12, 2014 · 9 comments
Closed

One-time token authentication #70

oberstet opened this issue Jun 12, 2014 · 9 comments

Comments

@oberstet
Copy link
Member

Design and then describe "one-time token" based WAMP authentication in the "WAMP Advanced Profile" specification.

Connected issues:

@mbonneau
Copy link
Contributor

I noticed that the ticket-based authentication has been removed from the AP.

I currently have projects that use this with JWT (which I think is a great fit for this). Is this something that will be coming back to the spec?

@oberstet
Copy link
Member Author

Oh, this is a bug! Seems I accidentally dropped it during my recent refactorings .. thanks for notice!

@mbonneau
Copy link
Contributor

Great! Thanks.

@oberstet
Copy link
Member Author

@mbonneau
Copy link
Contributor

This looks like it requires authid be set by the client:

"The HELLO.Options.authid|string is the authentication ID (e.g. username) the client wishes to authenticate as. For Ticket-based authentication, this MUST be provided."

When we originally implemented this we were referencing the persona example which set authid on the welcome.

I do see you referencing this feature here:

crossbario/crossbar#232

Should I open an issue on the spec about this?

@oberstet
Copy link
Member Author

Persona-based authentication used authmethod == persona, not authmethod == ticket.

This is all not yet completely sorted out, so you might of course file an issue and ideally work on proposals and how to get this all into a cohesive design.

Probably both scenarios are valid for ticket based auth: client providing auth ID plus ticket, or only ticket and auth ID being assigned.

Would be best to have a list of concrete use cases for this auth method first.

@oberstet
Copy link
Member Author

@mbonneau actually, HELLO.Options.authid|string MUST be provided for both WAMP-CRA and WAMP-Ticket, but MAY be even an empty string, the WELCOME.Details.authid|string MAY be different from the former, and MUST be the effective authid in use.

So you could provide an empty string in HELLO.Options.authid, and send the actual authid in WELCOME.Details.authid.

In above issue crossbario/crossbar#232 @Paranaix was asking for being able to set effective authid from dynamic authenticators in Crossbar.io. This is now possible, and the wire level WAMP messages exchanged conform to the spec.

Not sure, does above make sense? Need more text in the spec?

@mbonneau
Copy link
Contributor

Thanks for the reply. This makes sense.

@oberstet oberstet added this to the backlog milestone Aug 27, 2015
@oberstet oberstet removed this from the backlog milestone Feb 21, 2018
@oberstet oberstet added this to the spec-fixes-and-polish milestone Mar 3, 2018
@oberstet
Copy link
Member Author

oberstet commented Sep 1, 2018

sufficiently described IMO (as part of WAMP-Ticket based authentication)

@oberstet oberstet closed this as completed Sep 1, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants