SecurityDirectives
- Authentication vs. Authorization
- Authentication and Authorization in HTTP
- Low-level OAuth2 “Bearer Token” directives
- Credentials and password timing attacks
- authenticateBasic
- authenticateBasicAsync
- authenticateBasicPF
- authenticateBasicPFAsync
- authenticateOrRejectWithChallenge
- authenticateOAuth2
- authenticateOAuth2Async
- authenticateOAuth2PF
- authenticateOAuth2PFAsync
- authorize
- authorizeAsync
- extractCredentials
Authentication vs. Authorization
Authentication is the process of establishing a known identity for the user, whereby ‘identity’ is defined in the context of the application. This may be done with a username/password combination, a cookie, a pre-defined IP or some other mechanism. After authentication the system believes that it knows who the user is.
Authorization is the process of determining, whether a given user is allowed access to a given resource or not. In most cases, in order to be able to authorize a user (i.e. allow access to some part of the system) the users identity must already have been established, i.e. he/she must have been authenticated. Without prior authentication the authorization would have to be very crude, e.g. “allow access for all users” or “allow access for noone”. Only after authentication will it be possible to, e.g., “allow access to the statistics resource for admins, but not for regular members”.
Authentication and authorization may happen at the same time, e.g. when everyone who can properly be authenticated is also allowed access (which is often a very simple and somewhat implicit authorization logic). In other cases the system might have one mechanism for authentication (e.g. establishing user identity via an LDAP lookup) and another one for authorization (e.g. a database lookup for retrieving user access rights).
Authentication and Authorization in HTTP
HTTP provides a general framework for access control and authentication, via an extensible set of challenge-response authentication schemes, which can be used by a server to challenge a client request and by a client to provide authentication information. The general mechanism is defined in RFC 7235.
The “HTTP Authentication Scheme Registry” defines the namespace for the authentication schemes in challenges and credentials. You can see the currently registered schemes at IANA HTTP Authentication Scheme Registry.
At this point Akka HTTP only implements the “‘Basic’ HTTP Authentication Scheme” whose most current specification can be found here: https://datatracker.ietf.org/doc/rfc7617/.
Low-level OAuth2 “Bearer Token” directives
The OAuth2 directives currently provided in Akka HTTP are not a full OAuth2 protocol implementation, they are only a means of extracting the so called Bearer Token
from the Authorization
Authorization
HTTP Header, as defined in RFC 6750, and allow users to validate and complete the protocol.
Credentials and password timing attacks
When transforming request Credentials
into an application specific user identifier the naive solution for checking the secret (password) would be a regular string comparison, but doing this would open up the application to timing attacks. See for example Timing Attacks Explained for an explanation of the problem.
To protect users of the library from that mistake the secret is not available through the API, instead the method Credentials.Provided.verify(String)
should be used. It does a constant time comparison rather than returning early upon finding the first non-equal character.