💾 Archived View for thebird.nl › gn-gemtext-threads › topics › authentication › oauth2_clients.gmi captured on 2023-06-14 at 14:28:18. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

OAuth2

The new authorisation system is made up of two layers:

This document will concern itself mostly with "Client Authorisation".

Client Authorisation

The authentication/authorisation system will (probably) find use in the entire

suite of applications that are under the Genenetwork umbrella.

The relevant applications (as of 27 May 2023) are:

Genenetwork3

Serves as both the authorisation server and the API server.

Genenetwork 2

Will eventually be the main user-facing UI making requests to GN3 for data and computational requests.

QC and Data Upload

Provides a means to upload new data into the Genenetwork database. It does perform some quality-control on the data before upload. Currently, this application is not available to the general public due to the potential to mess up the data. Once the auth system has been running a while, and the major bugs quashed, this will be integrated into the other system and allow users to upload their own data.

In this case, the GN2 and QC applications would be clients to GN3 (as the auth

server), and will have specific scopes of access.

As such, we need to register the clients that can access the authorisation

server.

If you try to access the authorisation server, or for that matter, the API

server with a client that is not registered, you will receive an error message

of the form:

{
    "error": "invalid_client",
    "error_description": "No client found for the given CLIENT_ID and CLIENT_SECRET."
}

Registering a new OAuth2 Client

To enable the clients (such as GN2 and QC mentioned above) to work with the authentication and/or API server (GN3), we need to register them. We do that on GN3, and only an administrative user has that ability.

The administrative user logs on to GN3 on the `/api/oauth2/admin/login` endpoint. Once logged on, they can visit the "Register OAuth2 Client" page on the `/api/oauth2/admin/register-client` endpoint. There they can provide the necessary information, and select from a set of options that apply to the client they are registering.

Once the admin submits the registration information, the system will generate CLIENT_ID and CLIENT_SECRET values and show them. The CLIENT_SECRET value is stored encrypted in the system and there is no way to retrieve it once the user navigates it away from the registration page.

The CLIENT_ID and CLIENT_SECRET values are then added to the client's (e.g. GN2) configurations to enable the client access the servers.

The following sections will document the various options available when registering the clients.

Client Scope

The client's scope determines what the client is allowed to do and/or access on both the API and authorisation servers. Some of the scopes work in unison.

The remaining scope choices can mostly be ignored for all publicly-facing OAuth2 clients. The choices have, however, been documented below for completeness.

Basic Client Informations

Grant Types

There are a number of

OAuth2 grant types.

We currently only support the

Authorization Code Grant

with work to enable the

Refresh Token Grant

ongoing.

Down the road, we will also enable the

PKCE Extension for Authorisation Code flow

for better security.

Client Owner

Each client has as user that "owns" it. For Genenetwork clients, any system admin can be set up as the owner.

For clients registered by other users, then the owner of the client should be the user that requested to register the client.

For now, we do not support external clients, but this is possible down the road.

User Authentication/Authorisation

A user will make use of (an) authorised client(s) (see 'Client Authorisation'

section above) to access the authorisation and API servers.

Once the user has authenticated (provided valid authentication credentials),

they will be able to access the resources in the system according to the roles

and privileges that they are authorised for.