💾 Archived View for thebird.nl › gn-gemtext-threads › topics › authentication › oauth2_clients.gmi captured on 2023-06-14 at 14:28:18. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
The new authorisation system is made up of two layers:
This document will concern itself mostly with "Client Authorisation".
The authentication/authorisation system will (probably) find use in the entire
suite of applications that are under the Genenetwork umbrella.
The relevant applications (as of 27 May 2023) are:
Serves as both the authorisation server and the API server.
Will eventually be the main user-facing UI making requests to GN3 for data and computational requests.
Provides a means to upload new data into the Genenetwork database. It does perform some quality-control on the data before upload. Currently, this application is not available to the general public due to the potential to mess up the data. Once the auth system has been running a while, and the major bugs quashed, this will be integrated into the other system and allow users to upload their own data.
In this case, the GN2 and QC applications would be clients to GN3 (as the auth
server), and will have specific scopes of access.
As such, we need to register the clients that can access the authorisation
server.
If you try to access the authorisation server, or for that matter, the API
server with a client that is not registered, you will receive an error message
of the form:
{ "error": "invalid_client", "error_description": "No client found for the given CLIENT_ID and CLIENT_SECRET." }
To enable the clients (such as GN2 and QC mentioned above) to work with the authentication and/or API server (GN3), we need to register them. We do that on GN3, and only an administrative user has that ability.
The administrative user logs on to GN3 on the `/api/oauth2/admin/login` endpoint. Once logged on, they can visit the "Register OAuth2 Client" page on the `/api/oauth2/admin/register-client` endpoint. There they can provide the necessary information, and select from a set of options that apply to the client they are registering.
Once the admin submits the registration information, the system will generate CLIENT_ID and CLIENT_SECRET values and show them. The CLIENT_SECRET value is stored encrypted in the system and there is no way to retrieve it once the user navigates it away from the registration page.
The CLIENT_ID and CLIENT_SECRET values are then added to the client's (e.g. GN2) configurations to enable the client access the servers.
The following sections will document the various options available when registering the clients.
The client's scope determines what the client is allowed to do and/or access on both the API and authorisation servers. Some of the scopes work in unison.
The remaining scope choices can mostly be ignored for all publicly-facing OAuth2 clients. The choices have, however, been documented below for completeness.
There are a number of
We currently only support the
with work to enable the
ongoing.
Down the road, we will also enable the
PKCE Extension for Authorisation Code flow
for better security.
Each client has as user that "owns" it. For Genenetwork clients, any system admin can be set up as the owner.
For clients registered by other users, then the owner of the client should be the user that requested to register the client.
For now, we do not support external clients, but this is possible down the road.
A user will make use of (an) authorised client(s) (see 'Client Authorisation'
section above) to access the authorisation and API servers.
Once the user has authenticated (provided valid authentication credentials),
they will be able to access the resources in the system according to the roles
and privileges that they are authorised for.