This Authorizer is designed to work with a webserver to permit or deny access to resources given a SciToken.
This repo also includes the necessary configuration for an NGINX webserver to provide WebDav access using SciTokens for authorization. With this configuration, you may provide authenticated access to write (PUT) or read (GET) on the webserver.
- Public Hostname
- Port 80 and / or 443 open
- (For Docker) Ability to run small docker image
The Authorizer works along with the webserver, NGINX in this case, to determine if a specific action is authorized given a SciToken.
An example configuration is provided in configs/authorizer.cfg.
[Global]
audience = testing
[Issuer OSG-Demo]
issuer = https://demo.scitokens.org
base_path = /protected
audience
: The audience that the service should respond. Any tokens attempting to access this resource must have exactly the same audience. This can be a string, a comma separated list, or empty. A list of audiences will match tokens with any value in the list. An empty string will only allow tokens with no audience (aud
) set.Issuer
: A list of possible multiple issuers which will be accepted to access this resource.issuer
: The URL path of the issuer which will respond with the OAuth public key retrieval.base_path
: The base path for which this issuer may access. All URL's must be prepended by this base_path. But, tokens should not include this base path.
For example, imagine attempting to access the resource at /protected/important/data
.
- The
base_path
is shown in the configuration above, which is/protected
- The
scp
(scope) in the token must be at the leastread:/important
- The URL that is requested must be
/protected/important/data
The configuration above should not be used in production. Since it is using the demo.scitokens.org issuer, anyone can create a scitoken from that issuer that could read or write to your server.
SciTokens are passed unencrypted in the HTTP headers, therefore it is recommended to encrypt the connection with HTTPS. Here we will discuss how to use LetsEncrypt to secure your server. If you already have an SSL certificate that you would like to use, you may skip this section.
You may run certbot directly from docker with the following command. You will need to replace the email
and the domain (-d
option). The domain should be the public hostname of the server that will be running this service.
sudo docker run --privileged -v `pwd`/certs:/etc/letsencrypt -p 80:80 --rm certbot/certbot certonly --standalone --email <email> -d <domain> --agree-tos
After you run this command, it should report success and your certificates will be located in the certs
directory. To renew the certificate later, run the command:
sudo docker run -v `pwd`/certs:/etc/letsencrypt --net=host --rm certbot/certbot renew --standalone --email <email> -d <domain> --agree-tos
Full instructions on how to run CertBot is available on the official webiste.
An example NGINX configuration is provided in nginx.conf within the configs directory. It will enable HTTPS and use the provided python script for authorization.
If you would like to built-in NGINX, the configuration should replace the existing nginx.conf
configuration file.
A NGINX-SciTokens Docker container is provided. You may run the command directly using docker
, or use something like docker-compose to manage the container for you. An example docker-compose.yml
file is provided.
From the command line, the command would be:
sudo docker run --privileged -p 443:443 -p 80:80 -v `pwd`/certs:/etc/letsencrypt -v `pwd`/data:/data scitokens/nginx-scitokens
In this command, it would expect the LetsEncrypt command from before to be executed. The certificates should be in ./certs
. Further, it will read / write all data from the ./data
directory.
Testing your installation is dependent on a lot of factors:
- The issuer that you will be using
- The directory structure
- Permissions that should be tested (read/write)
But, if you used the default configuration above (which would leave your server open to read or write from anyone), then you can test it with a provided script. It will test both the read and write capabilities of the test setup.
You will need to create a few directories in order for the test script to work. First, create the www
directory under data
.
sudo mkdir -p data/www/protected
Then, make the directory world readable (this is only a test, after all). Not a great solution. The token issuer will protect directories with the scopes (scp
) attribute.
sudo chmod 777 data/www/protected
Next, run the script with the arguments of for your host. This can be run on the same node running the docker container, or any other computer since the container has a public IP address. Arguments and more help can be found with the -h
argument. Below is example arguments.
python test_http.py "https://example.com/protected/stuff/blah" "write:/stuff" "read:/stuff"
The script will retrieve a token from demo.scitokens.org with the scopes specified on the command line and attempt to write and read a 50MB file.
The Docker image demo above uses SciTokens to protect a WebDav endpoint. The NGINX configuration is also capable of protecting a WSGI interface with only minimal changes to the NGXIN configuration.
An overwritten configuration will need to be volume mounted over the existing configuration. An additional volume will need to be added to the docker run
command in the Running from Docker section. The additional option is -v authorizer.cfg:/etc/scitokens-auth/authorizer.cfg
. The new command line would be (long):
sudo docker run --privileged -p 443:443 -p 80:80 -v `pwd`/certs:/etc/letsencrypt -v `pwd`/data:/data -v authorizer.cfg:/etc/scitokens-auth/authorizer.cfg scitokens/nginx-scitokens