Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure critical parts #31

Open
gomezgoiri opened this issue Jan 27, 2016 · 1 comment
Open

Secure critical parts #31

gomezgoiri opened this issue Jan 27, 2016 · 1 comment

Comments

@gomezgoiri
Copy link
Member

To avoid users from messing up with the webapp, we should avoid them from learning currently opened sessions. This way, they cannot close other users' sessions (using DELETE on the session resource URL).

To do this we should limit the access to the following resources:

  • /management/backend.html
  • /v1/sessions/
@gomezgoiri
Copy link
Member Author

Alternatives that I am contemplating (in order of complexity and efficacy):

  1. Making these resources optional and add them to the webapp or not depending on a configuration property. Afterwards, they will be removed from the webapp to be deployed in the production site.
  2. Configure a filter in Tomcat to limit the access to these resources. E.g., allow access only to certain addresses.
  3. Implement authorization mechanism in the API. E.g., OAuth.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant