TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: What do you use for authentication and authorization?

457 pointsby natesover 6 years ago
I am currently starting work on a new app/website. Currently planning to have 1 BE API set to start, probably graphql (which will be user data/information and need to check with the auth server about being protected). I will also have many client apps (web, mobile, potential partners) that will need to make queries to that BE. Do you usually roll your own authentication or use something like auth0/fusionauth/gluu/etc? This product is going to need to be secure as it will be in the healthcare space (so think oidc).

53 comments

arkadiytover 6 years ago
Hard to say without more concrete details, but if I had to reply in broad strokes:<p>- For web, user&#x2F;pass login exchanged for plain session cookies. Should be marked httpOnly&#x2F;Secure, and bonus points for SameSite and __Host prefix [1]<p>- For web, deploy a preloaded Strict-Transport-Security header [2]<p>- For api clients, use a bearer token. Enforce TLS (either don&#x27;t listen on port 80, or if someone makes a request over port 80 revoke that token).<p>- If you go with OpenID&#x2F;Oauth for client sign-ins then require https callbacks and provide scoped permissions.<p>- Don&#x27;t use JWT [3]. Don&#x27;t use CORS [4].<p>Again these are broad strokes - if you gave more information you&#x27;d get a better response.<p>[1]: <a href="https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;Set-Cookie" rel="nofollow">https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;Se...</a><p>[2]: <a href="https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;Strict-Transport-Security" rel="nofollow">https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;Headers&#x2F;St...</a><p>[3]: <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;JSON_Web_Token" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;JSON_Web_Token</a><p>[4]: <a href="https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;CORS" rel="nofollow">https:&#x2F;&#x2F;developer.mozilla.org&#x2F;en-US&#x2F;docs&#x2F;Web&#x2F;HTTP&#x2F;CORS</a>
评论 #18769922 未加载
评论 #18767940 未加载
评论 #18767938 未加载
评论 #18767934 未加载
评论 #18770308 未加载
评论 #18769744 未加载
评论 #18770961 未加载
评论 #18768173 未加载
评论 #18770447 未加载
评论 #18767935 未加载
closeparenover 6 years ago
Healthcare is a dangerous sector for a security novice. Please make sure you are familiar with HIPAA [0], including your obligations when handling health information and the nature of possible sanctions. Handling health data at all is risky. Sharing it with partners is something you probably shouldn&#x27;t even consider before you can afford a serious legal team.<p>OpenID is a mechanism for one website to assert a user&#x27;s identity to another website. OAuth is a way to let a user delegate access to some of their data on one site to another site. Neither have any particular affinity with the healthcare space, and they are not things you sprinkle on for extra security.<p>[0] <a href="https:&#x2F;&#x2F;www.hhs.gov&#x2F;hipaa&#x2F;for-professionals&#x2F;security&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;www.hhs.gov&#x2F;hipaa&#x2F;for-professionals&#x2F;security&#x2F;index.h...</a>
评论 #18768833 未加载
评论 #18767942 未加载
pg_botover 6 years ago
I would echo a bunch of the comments in this thread. I am only posting this because I own a healthcare startup and your question put the fear of god in me. I would strongly advise that you build a different app if you do not already possess the knowledge required to do this. If you have the means hire a professional and you will be better off. You need to get this right from day 1 or people will get hurt, you will be fined into oblivion and&#x2F;or possibly thrown in jail. There are also numerous other security concerns that you should be worried about since Auth is just the tip of the iceberg.<p>I will add the following details which are specific for healthcare companies and a bit of inside baseball. Typically people use an email address as the lookup field for a user account. Since email addresses are considered protected health information under HIPAA, I would highly suggest you use usernames instead (possibly auto generated to be safe). HITRUST includes some details about password rules for their certification process. No one will question you if you follow their rules (I think it&#x27;s 12 characters minimum 1 Upper&#x2F;Lower&#x2F;Symbol&#x2F;Number each). Use a banned password list, you can find one here[0]. You are going to want to set up some manner of 2 factor authentication (I would recommend U2F or TOTP) for all accounts with manual code backup. OAuth and OpenID are goddamn nightmares. You need to own and manage this process entirely by yourself.<p>[0]: <a href="https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;Passwords" rel="nofollow">https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;Passwords</a>
Deestanover 6 years ago
Professionals.<p>Hire an expert.<p>If you can&#x27;t answer these questions yourself (which is fine - it&#x27;s specialized knowledge separate from the skillset needed for building a useful application), you are lacking <i>critical competence</i> for coding anything handling health information.<p>The security minefield is much much bigger than the login page.
评论 #18768880 未加载
评论 #18768894 未加载
评论 #18771394 未加载
评论 #18771784 未加载
评论 #18769507 未加载
throwawaymathover 6 years ago
Before writing any code you should seek to deeply understand the problem space of authentication and authorization. HIPAA compliance is primarily an authorization problem, not an authentication problem. That is: both are important, but the unique set of challenges within the scope of HIPAA have to do with <i>authorization</i> of read&#x2F;write access to data, not authentication.<p>Authentication asserts identities. Authorization asserts capabilities. This shifts and compartmentalizes the problem somewhat. Almost all interactive applications need to support robust authentication, but most applications do not require the sophisticated authorization restrictions HIPAA demands.<p>Whatever it is you choose, you should:<p>1) Use a mature, reputable library;<p>2) Use a library which provides the simplest possible interfaces for solving your needs in the most turnkey manner;<p>3) Engage with a reputable consulting firm specializing in HIPAA compliance and application security.<p>I would also recommend reading through as much information about Aptible&#x27;s architecture and design ethos as possible. They have done an excellent job of navigating this problem space.
nickjjover 6 years ago
I roll my own using well supported libraries for the languages I work with. These libraries handle the gory bits and pieces where it&#x27;s easy to make mistakes.<p>It&#x27;s a split between using passwordless logins, or standard password authentication depending on who the target audience is.<p>I would never in a million years ever think about using a service like auth0. It&#x27;s not just a huge privacy issue but now a critical component of your app depends on a third party service. Also I know of a few sites who use it and the user experience is really bad. It seems like every other time I access a site that uses it, I have to goto a third party auth0 screen to re-enter my login details (which are already auto-filled out by the browser).<p>Your user authentication flow is a very unique aspect of your site and it&#x27;s also one of the first things your users see.<p>You should have full control over it because if your user&#x27;s first impression is a slow loading non-intuitive user auth system that bugs them to login every few days they&#x27;re probably going to look for a competing service. I know I would.
评论 #18770860 未加载
buro9over 6 years ago
For authentication I use Auth0 on the free tier, with a passwordless setup that uses Google OAuth and Microsoft OAuth and allows fallback to emailing a code to a user. We store nothing more than the email address. The great thing about Auth0 is the separation it provides between the authentication layer and the web app, and how if you go down the SaaS route you can allow people to bring their own Auth0 accounts and configure their own bespoke authentication.<p>For authorization you are going to have to implement your own solution once you have an authenticated session. What someone can do always depends on your app and the functions you provide and so there is no nice third party solution to this. In my case I store the map of users to roles and what a role can do in a PostgreSQL app and cache there the answers to &quot;which users are in a role&quot; and &quot;what can a role do&quot;... user permission and roles changes are infrequent but flush the cache and so take immediate effect.
评论 #18768884 未加载
nzoschkeover 6 years ago
Ory Hydra<p><a href="https:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;hydra" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;hydra</a><p>Open source OAuth &#x2F; OpenID connect server<p>The docs, API and Docker images make it really easy to start developing against. Then the Docker images and database migration tools make it easy to deploy into our production infrastructure.<p>Also evaluating the other Ory tools like Keto, a policy engine.<p>The hackability of these is very attractive over closed services like Auth0.
评论 #18769787 未加载
评论 #18771331 未加载
评论 #18770297 未加载
konspenceover 6 years ago
Since it&#x27;s in the healthcare space, have you considered hiring a consulting team? Or at least a firm? What other Hacker News readers use for authentication is largely irrelevant since we don&#x27;t usually work on HIPAA-compliant applications.
评论 #18771013 未加载
Dowwieover 6 years ago
It depends on what type of system you plan to support. If it&#x27;s for a hospital setting featuring many different types of actors, roles, and constraints, this requires a greater level of sophistication.<p><i>Beware, authorization is an Alice in Wonderland rabbit hole where one may fall far deeper than one expected to.</i><p>A few years ago, I ported Apache Shiro from Java to Python, resulting in The Yosai Project: <a href="http:&#x2F;&#x2F;yosaiproject.github.io&#x2F;yosai" rel="nofollow">http:&#x2F;&#x2F;yosaiproject.github.io&#x2F;yosai</a><p>It was a grueling but rewarding experience.<p>I honored Shiro in name and license, open sourcing everything and using Apache 2. I went even further than Shiro by adding two factor authentication workflow using totp and including starter modules for caching, data store, and integration with the web app I was using (pyramid).<p>If you choose to use python, or even just want something to learn from and reference, check out Yosai. I put a lot into this work to make it useful for others, entirely on my own.<p>I spoke with Tobias (podcast init) about the project some time ago: <a href="https:&#x2F;&#x2F;www.podcastinit.com&#x2F;yosai-with-darin-gordon-episode-120&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.podcastinit.com&#x2F;yosai-with-darin-gordon-episode-...</a>
spricketover 6 years ago
If someone else needs to use your API, please use OAuth&#x2F;OIDC. I&#x27;ve seen countless hand-rolled (and insecure) authentication schemes. It&#x27;s almost always a nightmare. If you plan on connecting this to multiple apps and partners, rolling your own will create a hellscape for everyone<p>If you use OAuth, anybody can connect using a standard library and &quot;flow&quot; across tons of languages. And you don&#x27;t need to worry about screwing up the most security critical part of your API. It will save you countless headaches.<p>Some people bash OAuth because of JWT, but this overblown. Storing permissions in a token is the only sane way to do things if you end up with multiple services down the line (you will).<p>The whole revocation debate is a bunch of noise about nothing. Make the expiration interval fairly short, and if that isn&#x27;t enough you can make a cache of revoked tokens that only needs to live as long as your expiration interval. This is still orders of magnitude more efficient than not storing permissions in the token and just as secure.<p>If you need to revoke all tokens in a breach scenario you just change your signing key. I recommend using SHA256 based signatures rather than public&#x2F;private key since even though public&#x2F;private is theoretically more secure, calculating signatures is quite a bit of overhead. If your backend is using a fast language like java&#x2F;C#&#x2F;Go, the majority of server CPU will be signing tokens.<p>Read about OAuth and ignore the haters. The design is well thought-out, secure, and efficient. If it was really that bad you wouldn&#x27;t see most of the tech giants migrating to and using it. There&#x27;s a lot of people that don&#x27;t like it because they don&#x27;t understand it well enough.
aeleosover 6 years ago
I was in a similar position, we started using Okta and eventually migrated to AWS Cognito. Rolling your own auth is a recipe for disaster unless you know what you are doing and really need to. Also, be prepared to be fairly locked in once you choose an auth provider, especially if you choose one that is fairly integrated into your ecosystem.
评论 #18770407 未加载
评论 #18768494 未加载
davismwflover 6 years ago
I&#x27;d advocate against using third party services here. In general third party services and healthcare comes with a lot of hurdles and costs which you need to evaluate carefully. Even log data stored on a 3rd party server that might have some PII can be a violation of U.S. law unless they are a contracted BAA following all the same security and legal rules required of healthcare tech.<p>Overall just start with strong security in mind that will meet the U.S. healthcare security rules&#x2F;laws, even if you aren&#x27;t in the U.S., the basic principles are just focused around strong security. People can debate the specific methods, but I will argue using almost any third party service has potential problems for you with compliance. Yes, I agree and understand those services specialize around auth usually, and for most companies that is fine and even for some more fringe areas of healthcare that is fine. But take another viewpoint, that is because those companies secure so many disparate third parties their attack surface is huge compared to your own, and a vulnerability at their end may force you to do public disclosures. That alone isn&#x27;t a sole reason not to use them, but do consider all the factors.<p>Also, in the U.S. you will likely (depending on specific type of product) need to deal with HIPAA and other similar acts (HITECH&#x2F;TRUST etc). None of these are actually all that complicated if you take them into account early, although going back and adding them later can be a struggle.<p>Basic principles is secure everything, have timed (short interval) token expiration, have a global token expunge, and always err on the side of reauth over pass thru. Also, if you have many backend services, do not rely on a proxy authentication service to pass off requests. Force all services to validate the authentication of each request. Yes this is &quot;expensive&quot; in terms of extra cycles but it minimizes the risk considerably. Lastly, store trace and audit logs of everything you can imagine, all requests.
eximiusover 6 years ago
Edit: just read other comments pointing out the healthcare thing. Hire a professional.<p>Honestly, authentication is not that hard. There are many ways to do it, all with valid trade offs.<p>What you need to know is what your AUTHORIZATION story will be. Can anyone who can hit your API receive all data? Otherwise, you either need some kind of stateful access control or some kind of bearer token granting certain kinds of access. If the latter is simple enough for your use-case, then JWT, despite it&#x27;s naysayers, might shine for you. Otherwise you can just use about anything since you&#x27;ll be looking up what they can access in a DB anyway.
vwpolo3over 6 years ago
The open source ory ecosystem ( <a href="http:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;" rel="nofollow">http:&#x2F;&#x2F;github.com&#x2F;ory&#x2F;</a> ) might have what you&#x27;re looking for, but it&#x27;s definitely for advanced usecases. I know a lot of people that worked with Auth0&#x2F;Okta&#x2F;AWS Cognito but got so frustrated by downtimes, bugs, and complexity that they moved away. But it is an option for rapid prototyping although I&#x27;d keep a &quot;replace it&quot; somewhere in my milestone planning. Another possibility is Keycloak which is very enterprise &#x2F; java fullstack and quite complex to understand.<p>Most advice in the comments is pretty bad though. Stuff like &quot;API Clients need bearer tokens&quot; is completely backwards and pushed by marketing people from companies (Auth0, Okta, ...) that misuse open protocols (OAuth2, OIDC) as a way to legitimize the closed source saas approach they took. Along the lines &quot;if it looks complex it looks secure because most people have no idea&quot;. It&#x27;s actually very easy to use cookies (httpOnly, secure) with API clients and you&#x27;re saving yourself so much complexity with refreshing tokens and all that stuff.<p>Yet another possibility for super rapid prototyping is: <a href="https:&#x2F;&#x2F;github.com&#x2F;bitly&#x2F;oauth2_proxy" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bitly&#x2F;oauth2_proxy</a><p>edit:&#x2F;&#x2F; I forgot KeyCloak, but it&#x27;s also for advanced enterprise use cases (SAML, OIDC, Realms, ...) and (from what I&#x27;ve heard) with a steep learning curve and heavy.
评论 #18770520 未加载
评论 #18769794 未加载
yellowappleover 6 years ago
&quot;This product is going to need to be secure as it will be in the healthcare space (so think oidc).&quot;<p>Considering most EMRs (or at least the ones with which I&#x27;ve interacted) don&#x27;t go very far beyond a username&#x2F;password combo, you&#x27;re probably fine keeping things simple.<p>Generally, when in doubt, I&#x27;d strongly recommend using some existing auth library instead of trying to roll your own. It&#x27;s not clear where exactly in the healthcare world your site will fit, but if you&#x27;re aiming for hospitals, any hospital worth their salt is going to be using Active Directory or something similar, so you&#x27;ll probably want to find something that can support offloading user identification in that direction (and fall back to username&#x2F;password if the org doesn&#x27;t yet have AD).<p>I don&#x27;t know your specific jurisdiction, but at least in the US, as long as you&#x27;re encrypting all your data (both at-rest and in-transit) and aren&#x27;t doing anything egregiously stupid (plaintext passwords, single shared password for everyone, literally selling patient data on the Dark Web, etc.) you should have a pretty hard time violating HIPAA, and you&#x27;ll already be on-par with most extant medical systems. Any further hardening on the authentication front (e.g. specific session management strategies) will just be icing on the security cake.<p>If you haven&#x27;t already, I&#x27;d suggest reviewing NIST&#x27;s guidelines for system security; most official HIPAA reference materials point toward NIST guidelines, and most hospitals will tend toward that direction as well.
INTPenisover 6 years ago
If your plan is to connect other services then I&#x27;d suggest using LDAP for central authentication.<p>It can easily be connected to any API without much &quot;glue&quot;. And most common open source services already support it as auth backend.<p>It&#x27;s also easier to audit than any custom service you might concoct on your own because auditors already have experience with it through Active Directory.
评论 #18768740 未加载
shocked-pikachuover 6 years ago
I have been using JWT[1] since it&#x27;s initial push as a mainstream authentication method. There&#x27;s plenty of libraries that support it and make it easier to use[2]. There&#x27;s even 0Auth[3] that is a company based around offering authentication services. Simply check for a valid token in the Authorization header, check out the introduction [4].<p>The library I&#x27;ve linked brings up a good point to make sure that you know the difference between decoding and verifying the token, but after that it&#x27;s fairly plain sailing.<p>[1]: <a href="https:&#x2F;&#x2F;jwt.io" rel="nofollow">https:&#x2F;&#x2F;jwt.io</a> [2]: <a href="https:&#x2F;&#x2F;github.com&#x2F;auth0&#x2F;node-jsonwebtoken" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;auth0&#x2F;node-jsonwebtoken</a> [3]: <a href="https:&#x2F;&#x2F;auth0.com" rel="nofollow">https:&#x2F;&#x2F;auth0.com</a> [4]: <a href="https:&#x2F;&#x2F;jwt.io&#x2F;introduction&#x2F;" rel="nofollow">https:&#x2F;&#x2F;jwt.io&#x2F;introduction&#x2F;</a>
rodrigopetterover 6 years ago
We use a local version of UAA (<a href="https:&#x2F;&#x2F;docs.cloudfoundry.org&#x2F;concepts&#x2F;architecture&#x2F;uaa.html" rel="nofollow">https:&#x2F;&#x2F;docs.cloudfoundry.org&#x2F;concepts&#x2F;architecture&#x2F;uaa.html</a>) he behaves like a google or facebook authentication where the user concedes the permission to the apps using OAuth 2.0 protocol.<p>We have 10+ web clients, 2 mobile apps and one internet gateway. Spring Security make it very easy to integrate everything.<p><a href="https:&#x2F;&#x2F;oauth.net&#x2F;2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;oauth.net&#x2F;2&#x2F;</a> Auth0 is the best documentation to learn about oauth: <a href="https:&#x2F;&#x2F;auth0.com&#x2F;docs&#x2F;protocols&#x2F;oauth2" rel="nofollow">https:&#x2F;&#x2F;auth0.com&#x2F;docs&#x2F;protocols&#x2F;oauth2</a><p>The best part of using Oauth is that you can change your authentication server (UAA, Auth0, etc) without changing your app code (only configurations)
rwieruchover 6 years ago
If I do a MVP with React.js, my go to solution is Firebase. [0] Authorization is possible as well. [1] If I need to scale this MVP, I would eventually migrate to a self-hosted backend solution. In my case, it would be Node.js with a GraphQL interface that enables authentication with JWT [2]. Alternatives could be Passport.js and Auth0.<p>- [0] <a href="https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;complete-firebase-authentication-react-tutorial&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;complete-firebase-authentication...</a><p>- [1] <a href="https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;react-firebase-authorization-roles-permissions&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;react-firebase-authorization-rol...</a><p>- [2] <a href="https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;graphql-apollo-server-tutorial&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.robinwieruch.de&#x2F;graphql-apollo-server-tutorial&#x2F;</a>
verdvermover 6 years ago
Check out <a href="https:&#x2F;&#x2F;github.com&#x2F;sysgears&#x2F;apollo-universal-starter-kit" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;sysgears&#x2F;apollo-universal-starter-kit</a><p>Fullstack JS, Apollo GraphQL, numerous client types, batteries included. Has auth implemented plus a number of other things you will find useful in the graphql world.<p>If you are in healthcare, you may want to find an auth system like DEX that can talk to several backends like LDAP &amp; Active Directory, as each hospital or institution will likely want to reuse what they currently have implemented. You&#x27;ll need to hook into them. (This is on our roadmap)
jammygitover 6 years ago
I&#x27;m using a selfmade system atm as as excuse to learn the subject for a MEAN app, but I would use OKTA or some similar service if I was &#x27;playing for keeps.&#x27; Just boring client side sessions using Mozilla&#x27;s client-sessions library with bcrypt for passwords.<p>I&#x27;m finding it hard to get information above the &#x27;follow these steps to use this library&#x27; level, yet beneath &#x27;here&#x27;s how to make a cryptosystem from scratch&#x27;. I&#x27;m about to read some RFCs unless I find a better intro resource.
sebslomskiover 6 years ago
All new apps I’m building are based on password-less auth [1] &amp; bearer token. NoPassword is just so much more comfortable than having to remember passwords. And boy, people are really bad at coming up with passwords - you might have seen it this Christmas at your parents’. [1] <a href="http:&#x2F;&#x2F;notes.xoxco.com&#x2F;post&#x2F;27999787765&#x2F;is-it-time-for-password-less-login" rel="nofollow">http:&#x2F;&#x2F;notes.xoxco.com&#x2F;post&#x2F;27999787765&#x2F;is-it-time-for-passw...</a>
评论 #18769438 未加载
writepubover 6 years ago
Truth about side-projects is most never get to the finish line. I&#x27;d like to encourage you to get there, and for that, you&#x27;ll need to use a third party for auth, at least till you finish your API and seek feedback&#x2F;scale. You can always roll your own after you&#x27;ve validated the viability of your API.<p>You can choose firebase or AWS Cognito. They offer readymade sever and client SDKs for a wide variety of targets. Firebase is always free, and AWS free for 50,000 users<p>They offer authorization based on roles
blhackover 6 years ago
Roll my own. Passwords are stored as bcrypt hashes. Just use plain old cookies to store session IDs.
评论 #18771183 未加载
评论 #18769185 未加载
评论 #18768203 未加载
throwawayplsover 6 years ago
Devise, if you’re building a Rails app.
chirauover 6 years ago
Why do all API development tutorials always say &quot;Never roll out your own custom auth&quot;? I always found it weird
评论 #18768093 未加载
评论 #18771275 未加载
评论 #18768074 未加载
victorNicolletover 6 years ago
We use SAML set up for our customers&#x27; identity providers (most of the time, Office365 Azure AD or Google Suite), from a NuGet package.<p>From there, it&#x27;s a bearer token encoded in JWT format for ease of debugging. From another NuGet.<p>We also support username and public key authentication for our SFTP server.<p>We do support username and password if necessary.
评论 #18768860 未加载
IloveHN84over 6 years ago
We use Truedentity (<a href="https:&#x2F;&#x2F;www.truedentity.de" rel="nofollow">https:&#x2F;&#x2F;www.truedentity.de</a>) which is pretty robust with smartcard and palm vein pattern to make access secure. It uses EJBCA as backend for PKI and it&#x27;s possible to configure redundancy with it.
fiatjafover 6 years ago
Ignoring the body of your question and answering just the title, I&#x27;m developing <a href="https:&#x2F;&#x2F;accountd.xyz&#x2F;" rel="nofollow">https:&#x2F;&#x2F;accountd.xyz&#x2F;</a> as a system for mixing and linking identities (email, twitter, github, trello, indieauth for now) and using that for <a href="https:&#x2F;&#x2F;trackingco.de&#x2F;" rel="nofollow">https:&#x2F;&#x2F;trackingco.de&#x2F;</a>, <a href="https:&#x2F;&#x2F;listhub.xyz&#x2F;" rel="nofollow">https:&#x2F;&#x2F;listhub.xyz&#x2F;</a> and <a href="https:&#x2F;&#x2F;sitios.xyz&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sitios.xyz&#x2F;</a>.<p>In theory anyone can use it, it works automatically and you don&#x27;t have to register or anything like that, but I don&#x27;t know if people are interested in it.
nine_kover 6 years ago
I wonder why macaroons [1] are not even mentioned in this discussion yet.<p>They have all the upsides of cookies, but also can be narrowed down to be handed to third parties (good for APIs), caveats, and have a standardized and implemented [2] verification scheme.<p>I wonder why they don&#x27;t see wider use. Do they have significant downsides?<p>[1]: <a href="http:&#x2F;&#x2F;hackingdistributed.com&#x2F;2014&#x2F;05&#x2F;16&#x2F;macaroons-are-better-than-cookies&#x2F;" rel="nofollow">http:&#x2F;&#x2F;hackingdistributed.com&#x2F;2014&#x2F;05&#x2F;16&#x2F;macaroons-are-bette...</a><p>[2]: <a href="https:&#x2F;&#x2F;github.com&#x2F;rescrv&#x2F;libmacaroons" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;rescrv&#x2F;libmacaroons</a>
评论 #18772607 未加载
fmaover 6 years ago
I&#x27;m mostly a backend developer (batch processing, systems integration etc) and it still amazes me there&#x27;s no turney solution for different languages. I work in a large enterprise so we hook into our SSO for any kind of Auth for our web apps, though I haven&#x27;t personally had to deal with this since my college days. If I remmebr.NET had something out of the box.<p>Anyways, when I dabbled a few years back, I uses stormpath but they closed down. Les Hazelwood, the creator or Apache Shiro works at Okta now... Which seems to provide enterprise security.<p>Can anyone comment on their experience with Shiro, or Okta in general, and if it would help OP.
exabrialover 6 years ago
U2F + a password or biometric.<p>What I wish is Apple and co would give the consumer choices. I am a low threat target; I don&#x27;t need to enter a pw to unlock the SIP. So presenting a fingerprint + a hardware key would be a huge security improvement and a reasonable defense against 99.9999999% of the threats I face. Unfortunately, Apple assumes we&#x27;re all being targeting by physical attacks from the NSA, decreasing my convenience level for a non-existant threat.
based2over 6 years ago
<a href="https:&#x2F;&#x2F;www.apereo.org&#x2F;projects&#x2F;cas" rel="nofollow">https:&#x2F;&#x2F;www.apereo.org&#x2F;projects&#x2F;cas</a><p><a href="https:&#x2F;&#x2F;www.freeipa.org&#x2F;page&#x2F;Main_Page" rel="nofollow">https:&#x2F;&#x2F;www.freeipa.org&#x2F;page&#x2F;Main_Page</a><p><a href="https:&#x2F;&#x2F;www.rcdevs.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.rcdevs.com&#x2F;</a>
somada141over 6 years ago
I&#x27;m in the same boat (SaaS app in the health sector) and opted for Auth0 after using it a fair bit in the finance sector with work. I&#x27;d say start with that and once your app outgrows it then you can roll out a solution of your own but I&#x27;d suggest you don&#x27;t try to reinvent that particular wheel when you&#x27;re starting out.
sidcoolover 6 years ago
Auth0 for authentication, custom authorization.
ai_iaover 6 years ago
I use meteor and graphql with accounts package and Alan&#x27;s: roles packagr. It&#x27;s pretty easy using meteor.
arnonejoeover 6 years ago
We did the bakeoff and AWS Cognito is the by far the cheapest. It&#x27;s not as well documented but supports Open Id Connect just like all the other 3rd party auth solutions. The downside is that Cognito does not support a Resource Owner Password Flow (not recommended anyhow. see RFC6749).
CSMastermindover 6 years ago
Echoing the others telling you to hire a professional. If you have the money Okta has a professional services division that will set everything up for you. Use them. If you don&#x27;t have the money us Auth.0. Don&#x27;t try to handroll everything you will regret it.
dagoatover 6 years ago
If you have the budget for it just use auth0 or similar. You will likely spend less time wiring it up than coming up with a solution yourself.<p>Going off your question only, this will also likely end up being the most secure implementation for you (relying on a third party service)
BillinghamJover 6 years ago
&gt; healthcare<p>&gt; OIDC<p>Nooope. Not a good idea. OIDC is pretty damn complicated to implement as a server. And it doesn&#x27;t help at all with anything around revocation etc. To make that possible, you have to add a load of extra work and you basically lose most of the benefits of using JWTs.<p>First, as others have said, if you don&#x27;t know what you&#x27;re doing on this, you have no business trying to secure health data. Bring in someone who does know what they&#x27;re doing and then pentest it aggressively.<p>Second, I&#x27;d suggest you&#x27;d be better keeping it super simple. Just have a token in a table, refer to the token by its ID and then attach a 32 byte crypto random to it which gets checked before the existence of the token is acknowledged. Compare it with constant timing. If you don&#x27;t know what that is, again, you shouldn&#x27;t be doing it with health data - best to learn on a project with less sensitive info.
21stioover 6 years ago
imho github.com&#x2F;casbin&#x2F;casbin is the go to solution when it comes to authorization, it supports ACL, RBAC, ABAC, it&#x27;s optimized for performance, it&#x27;s pretty language agnostic, backed by tencent
floriferousover 6 years ago
You can use meteor’s healthcare track, specifically designed for healthcare apps: <a href="http:&#x2F;&#x2F;clinical.meteorapp.com" rel="nofollow">http:&#x2F;&#x2F;clinical.meteorapp.com</a>
isostaticover 6 years ago
All our users have client certs, so using then makes sense to me.
vishalsharmaover 6 years ago
I have heard of keycloak , open source auth platform<p>any reviews ?
评论 #18769067 未加载
sfullerover 6 years ago
There are seriously dangerous attitudes in this thread regarding what constitutes token invalidation. Hire someone skilled at secure auth architecture. You should have at least 2-3 senior engineers who are very well versed in this if this company is serious about doing anything related to protected patient healthcare data. One person&#x27;s opinion should never end up being the only input for super critical decisions like you are trying to make.
ramijamesover 6 years ago
Well, we build and use Scatter (<a href="http:&#x2F;&#x2F;get-scatter.com" rel="nofollow">http:&#x2F;&#x2F;get-scatter.com</a>), which is both a desktop app and a JS and C# library. This allows you to use the EOS or Tron blockchains and their account systems. Our users have local access to remote accounts on those networks. It&#x27;s pretty amazing software, and it is really fun building something totally new.
rodmenaover 6 years ago
Using anything other than your own libs for your specific needs probably will lead to over engineering.
lichtenbergerover 6 years ago
I&#x27;m using Keycloak for authentication and Vert.x for aauthorization besides the main use case.
jiveturkeyover 6 years ago
in the healthcare space really helps. great detail for this question. honestly, not many people are good at asking questions.<p>you need an expert, someone that doesn’t need to ask this question.
reilly3000over 6 years ago
Okta.
mattbgatesover 6 years ago
Email or text message sent to customer and they just input the number they were sent to match.
评论 #18768213 未加载
InGodsNameover 6 years ago
Once we lost the user account DB at a startup to database data loss and some other day, someone logged into mongodb and dropped all the tables and backups were not test before, so they did not work.<p>After that we no longer store these details.<p>We&#x27;ve been using amazon cognito with lambda authorizers.
评论 #18779406 未加载