Skip to content
This repository has been archived by the owner on May 4, 2019. It is now read-only.

Post/simple part1 simple api lockdown #14

Open
wants to merge 8 commits into
base: master
Choose a base branch
from

Conversation

paulfranzen
Copy link
Contributor

No description provided.


Something like:

Requesting APP (using the wonderful Faraday):
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe link to Faraday? (in a new window)

@mattjstar
Copy link
Contributor

Yeah I'd definitely update the title, maybe add the word "encryption" in it, cause it's sexy

How to encrypt a rails api... etc.. etc...

author: paul_franzen
summary: Ever needed a simple way to lock down an API?
image: http://res.cloudinary.com/wework/image/upload/s--Al86WVSb--/c_fill,fl_progressive,g_face:center,h_1000,q_jpegmini:1,w_1600/v1427921778/engineering/5-ways-to-create-bulletproof-software-bear.jpg
categories: rails, api, security, engineering
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we should probably limit these to shorten the url no? We've been going with just "engineering" now, which is redundant, tbh this category stuff needs to be revisited

@abest0
Copy link

abest0 commented Dec 15, 2015

@mattjstar adding Encryption into the title will unleash a momentus Reddit shit torrent in the this posts direction if it is not 100% accurate and bulletproof.... tread lightly.

@mattjstar
Copy link
Contributor

ah, k

>
> This belief can sometimes mean uncomfortable travels in which trust outweighs mistrust and you are willing to take on risk in the interest of greater success for both yourself and your community.
>
> Ok. Now that's out of the way. What follows is a system/explanation, undoubtedly flawed, but one which We hope will help some folks to understand some security concepts a little better and maybe help them in there travels.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

their

end
```

Now we are accessing this user based on an easily revoke-able token in the client app.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But now you have to look up the User by their token, which was the whole thing we wanted to avoid in the first place, right?

You could dispense with the encrypted_user_uuid stuff and just use a token if that's your style.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this would function as a "double layer" which would allow our base auth service to continue to feed out to any and all apps it serves, while the individual apps could run their own "extra" tokeny system

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Interesting. I think there are some tradeoffs there in letting individual apps run additional authentication schemes. Could be a good discussion, up to you. (Like, what if I can authenticate to half the apps but not the other half? That would be a weird situation. Note that authentication != authorization.)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants