Skip to content

Latest commit

 

History

History

oauth2-oidc-remember-me

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

OAuth2/OIDC Remember Me

Provides a persistent Remember Me mechanism for OAuth2/OIDC to survive server restarts or work inside clustering environments.

Note

Primarily designed for OIDC and E-Mails

Detailed explanation of why this exists

The problem

When a client/user tries to migrate to another instance of the webapp, e.g.

  • after it/the server was restarted
  • after being redirected to another node inside the cluster

it no longer recognizes the session and with that all authentification data.

Existing options

Persisting the session

There are some approaches for persisting the Session with Spring Boot, however they usually involve serializing and persisting the session.

There are some problems with that:

  • The session needs to be serializable
  • If using Java Serialization: It's insecure and will always be
  • When updating your app the session data might become incompatible (especially when using Java serialization) and migrating it might be extremely difficult
  • The sessions can contain a ton of data (and that needs to be store somewhere on the backend)
  • If the persistent data/backend is breached, an attacker can easily use this data to login in / steal personal information
  • When restoring the session it might be necessary to invoke app-specific logic

⚠ IMPORTANT
Data that should survive restarts/instance-switches (like the contents of a shopping cart) must NOT be stored inside the session!
Store them in a persistent database or something similar

Remember-Me Authentication

Spring Boot provides Remember-Me authentication.

This is a lot better than using serializing the session, as it doesn't requires lots of serialization and data-storage.

However are still some problem with that:

  • You need to revalidate if the client is still allowed to login
    • This means communicating with the OIDC server, to get relevant information
      • If the OIDC server is down you have a problem because you can't get the required data
  • If the persistent data/backend is breached, an attacker can easily use this data to login in

How is this improved here?

  • If the persistent data/backend is breached, the data is useless for the attacker:
    • The data is stored on the client which the attacker cannot access easily
    • An attacker has to get both: The server encryption key (stored on server) and the client encryption keys (stored in database)
    • The encryption keys can easily be rotated (just create a new payload-encryption version, see example configuration below)
  • Most logic after the deserialization is not needed; Re-Validation is only required if the client was not seen for a longer time

How it works

Overview

For more detailed docs have a look at the javadoc of OAuth2CookieRememberMeServices.

Requirements

Usage

Example configuration

sse:
  auth:
    remember-me:
      payload-encryption:
        standard: v2
        chacha20:
          v2:
            nonce: JustForDev_1
        aesgcm:
          legacy:
            init-vector: RandomInitIV
            secret-key-length: 16

Additional information

  • If you use clustering you should still use Stick Sessions for the HTTP-Session
    • Otherwise a lot of performance might get lost due to the decryption overhead
  • The size of a cookie is limited to ~4kB. If you have a ton of data inside the serialized authentication data (e.g. additional OIDC attributes) you might have to trim it down (instruct the OIDC server to send less) or customize the serialization to exclude it.
    • By default there are compression mechanism in place to try to keep the serialized data low (usually a cookie has around ~2kB). This includes using
      • the bare minimum for JSON attribute-names
      • deflate to compress the created JSON
      • an overhead-less encryption (e.g. ChaCha20)