-
Notifications
You must be signed in to change notification settings - Fork 1
UAA APIs
The User Account and Authentication Service (UAA):
- A separate application from the Cloud Controller
- Owns the user accounts and authentication sources
- Called via JSON APIs
- Support for standard protocols to provide single sign-on and delegated authorization to web applications in addition to JSON APIs to support the Cloud Controller and team features of Cloud Foundry
- Support APIs and a basic login/approval UI for web client apps
- Support APIs for user account management for an external web UI (i.e.
www.cloudfoundry.com
)
(Rather than trigger arguments about how RESTful these APIs are we'll just refer to them as JSON APIs. Most of them are defined by the specs for the OAuth2, OpenID Connect, and SCIM standards.)
APIs in this document:
Authentication and Delegated Authorization APIs
- Get authorization approval or access token: /oauth/authorize
- Validate access token: /check_token
- Get access token: /oauth/token
- Validate authentication token: /check_id
- Get user information: /userinfo
- Get login information and prompts: /login_info
- JWT token key for verifying tokens: /token_key
- Access token admin:
/oauth/(users|clients)/tokens/.*
- Client registration admin:
/oauth/clients/.*
User Account APIs
- Create a user: /User
- Update a user: /User/{id}
- Change password: /User/{id}/password
- Query for information about users: /Users
- Delete a user: /User/{id}
Management information
Several modes of operation and other optional features can be set in configuration files. Settings for a handful of standard scenarios can be externalized and switched using environment variables or system properties.
-
Internal username/password authentication source
The UAA manages a user account database. These accounts can be used for password based authentication similar to existing Cloud Foundry user accounts. The UAA accounts can be configured with password policy such as length, accepted/required character types, expiration times, reset policy, etc.
-
Other Authentication sources
External authentication sources can also be built and tested as standard alternatives. The most common and therefore the expected starting point are LDAP server, or an external OpenID provider (e.g. Google). Another expected authentication source would be Horizon Application Manager either through OAuth2 (preferred), or SAML protocols. General SAML2 support is not currently planned but could be added and would provide capabilities similar to OpenID and OAuth.
This section deals with machine interactions, not with browsers, although some of them may have browsable content for authenticated users. All machine requests have accept headers indicating JSON (or a derived media type perhaps).
The /userinfo
, /check_id
, and /token
endpoints are specified in the OpenID Connect and OAuth2 standards and should be used by web applications on a cloud foundry instance such as micro, www, support, but will not be used by flows from vmc.
The OAuth2 spec includes a scope
parameter as part of the token granting request (actually it is a set of scope values). The spec leaves the business content of the scope up to the participants in the protocol - i.e. the scope values are completely arbitrary and can in principle be chosen by any Resource Server using the tokens. Clients of the Resource Server have to ask for a valid scope to get a token, but the Authorization Server itself attaches no meaning to the scope - it just passes the value through to the Resource Server. The UAA implementation of the Authorization Server has a couple of extra scope-related features (by virtue of being implemented in Spring Security where the features originate).
-
There is an optional step in client registration, where a client declares which scopes it will ask for, or alternatively where the Authorization Server can limit the scopes it can ask for. The Authorization Server can then check that token requests contain a valid scope (i.e. one of the set provided on registration).
-
The Resource Servers can each have a unique ID (e.g. a URI). And aother optional part of a client registration is to provide a set of allowed resource ids for the client in question. The Authorization Server binds the allowed resource ids to the token and then provides the information via the
/check_token
endpoint, so that a Resource Server can check that its own ID is on the allowed list for the token before serving a resource.
Resource IDs have some of the character of a scope, except that the clients themselves don't need to know about them - it is information exchanged between the Authorization and Resource Servers. The examples in this document use a scope
parameter that is obvisouly itself a URI, e.g. for a Cloud Controller instance. This is a suggested usage, but whether it is adopted by the real Cloud Controller is not crucial to the system. Similarly any Resource Server that wants to can check the allowed resource IDs if there are any, but it is not mandatory to do so.
An OAuth2 defined endpoint to provide various tokens and authorization codes.
For the vmc
flows in this document, we will probably be using the OAuth2 Implicit grant type (to avoid a second round trip to /token
and so vmc does not need to securely store a refresh token). The authentication method for the user is undefined by OAuth2 but a POST to this endpoint is acceptable, although a GET must also be supported (see the spec).
Effectively this means that the endpoint is used to authenticate and obtain an access token in the same request. Note the correspondence with the UI endpoints (this is similar to the /login
endpoint with a different representation).
N.B. a GET is used in the relevant section of the spec that talks about the implicit grant, but a POST is explicitly allowed in the section on the /oauth/authorize
endpoint, paragraph 5.
All requests to this endpoint MUST be over SSL.
-
Request:
POST /oauth/authorize
-
Request Body: some parameters specified by the spec, appended to the query component using the "application/x-www-form-urlencoded" format,
response_type=token
client_id=vmc
scope=read write
-
redirect_uri
- optional because it can be pre-registered, but a dummy is still needed where vmc is concerned (it doesn't redirect)
and some required by us for authentication:
credentials={"username":"dale","password":"secret"}
which contains the required information in JSON as returned from the Login Information Endpoint endpoint, e.g. username/password for internal authentication, or for LDAP, and others as needed for other authentication types
-
Response Header: location as defined in the spec includes
access_token
if successfulHTTP/1.1 302 Found Location: oauth:redirecturi#access_token=2YotnFZFEjr1zCsicMWpAA&token_type=bearer
-
Response Codes:
302 - Found
This is a completely vanilla as per the OAuth2 spec, but we give a brief outline here for information purposes
-
Request:
GET /oauth/authorize
-
Request Body: some parameters specified by the spec, appended to the query component using the "application/x-www-form-urlencoded" format,
response_type=code
client_id=www
scope=read write password
-
redirect_uri
is optional because it can be pre-registered
-
Request Header:
-
Cookie: JSESSIONID=ADHGFKHDSJGFGF; Path /
- the authentication cookie for the client with UAA. If there is no cookie user's browser is redirected to the/login
, and will eventually come back to/oauth/authorize
.
-
-
Response Header: location as defined in the spec includes
access_token
if successfulHTTP/1.1 302 Found Location: https://www.cloudfoundry.example.com?code=F45jH
-
Response Codes:
302 - Found
See below for a more detailed description of the token endpoint.
-
Request: the authorization code (form encoded), e.g.
POST /oauth/token code=F45jH
-
Response Body:
{ "access_token":"2YotnFZFEjr1zCsicMWpAA", "token_type":"bearer", "expires_in":3600, }
-
Response Codes:
200 OK
An endpoint that allows a resource server such as the cloud controller to validate an access token. Interactions between the resource server and the authorization provider are not specified in OAuth2, so we are adding this endpoint. The request should be over SSL and use basic auth with the shared secret between the UAA and the cloud controller. The POST body should be the access_token and the response includes the userID, user_name and scope of the token in json format. The client (not the user) is authenticated via basic auth for this call.
OAuth2 access_tokens are opaque to clients, but can be decoded by resource servers to obtain all needed information such as userID, scope(s), lifetime, user attributes. If the token is encrypted witha shared sceret between the UAA are resource server it can be decoded without contacting the UAA. However, it may be useful -- at least during development -- for the UAA to specify a short, opaque token and then provide a way for the resource server to return it to the UAA to validate and open. That is what this endpoint does. It does not return general user account information like the /userinfo endpoint, it is specifically to validate and return the information represented by access_token that the user presented to the resource server.
This endpoint mirrors the OpenID Connect /check_id
endpoint, so not very RESTful, but we want to make it look and feel like the others. The endpoint is not part of any spec, but it is a useful tool to have for anyone implementing an OAuth2 Resource Server.
-
Request: uses basic authorization assuming the caller (a resource server) is actually also a registered client:
base64(resource_server:shared_secret)
POST /check_token HTTP/1.1 Host: server.example.com Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ== Content-Type: application/x-www-form-encoded token=eyJ0eXAiOiJKV1QiL
-
Successful Response:
HTTP/1.1 200 OK Content-Type: application/json { "id":"4657c1a8-b2d0-4304-b1fe-7bdc203d944f", "resource_ids":["openid","cloud_controller"], "scope":["read"], "email":"marissa@test.org", "client_authorities":["ROLE_UNTRUSTED"], "expires_in":43173, "user_authorities":["ROLE_USER"], "user_id":"marissa", "client_id":"vmc" }
Notes:
-
The
user_id
is the same as you get from the (OpenID Connect)/userinfo
endpoint. Theid
field is the same as you would use to get the full user profile from/User
. -
Many of the fields in the response are a courtesy allow the caller to avoid further round trip queries to pick up the same information (e.g. via the
/User
endpoint). -
The
client_*
data represent the client that the token was granted for, not the caller. They can be used by the caller, for example, to verify that the client has been granted permission to access a resource.
-
-
Error Responses: see OAuth2 Error reponses and this addition:
HTTP/1.1 400 Bad Request Content-Type: application/json;charset=UTF-8 Cache-Control: no-store Pragma: no-cache { "error":"invalid_token" }
Not needed for vmc. This endpoint would be used by web flows.
An OAuth2 defined endpoint which accepts authorization code or refresh tokens and provides access_tokens. The access_tokens can then be used to gain access to resources within a resource server.
- Request:
POST /oauth/token
Not needed for vmc. This endpoint might be used by web flows.
An OpenID Connect defined endpoint. It accepts an id_token, which contains claims about the authentication event. It validates the token and returns information contained in the token in JSON format. Basically makes it so that clients do not need to have full token handling implementations.
-
Request:
POST /check_id id_token=LKFJHDSG567TDFHG
Not needed for vmc. This endpoint would be used by web flows.
An OAuth2 protected resource and an OpenID Connect endpoint. Given an appropriate access_token, returns information about a user. Defined fields include various standard user profile fields. The response may include other user information such as group membership.
-
Request:
GET /userinfo
-
Response:
{ "user_id":"olds", "email":"olds@vmare.com" }
An endpoint which returns login information, e.g prompts for authorization codes or one-time passwords. This allows vmc to determine what login information it should collect from the user.
This call will be unauthenticated.
-
Request:
GET /login_info
orGET /login
-
Request body: empty
-
Response body: example
HTTP/1.1 200 OK Content-Type: application/json "prompt": { "email":["text", "validated email address"], "password": ["password", "your UAA password" ] "otp":["password", "security code"], }
The plan is to support Simple Cloud Identity Management (SCIM) for these APIs and endpoints. Authentication is by OAuth2 token, and access decision is undefined - which users are allowed to do these operations? Since this is independent of individual client applications' access decisions, a simple (role-based) decision based on local data is adequate.
SCIM has endpoints in /group/* as well which are probably useful (for the local access decisions in the UAA), but we don't need to support groups in UAA yet. We might need a pass through based on attributes from external stores like LDAP (which could be groups).
See SCIM - Creating Resources.
-
Request:
POST /User
-
Request Body:
{ "schemas":["urn:scim:schemas:core:1.0"], "userName":"bjensen", "name":{ "formatted":"Ms. Barbara J Jensen III", "familyName":"Jensen", "givenName":"Barbara" } }
The userName
is unique in the UAA, but is allowed to change. Each user also has a fixed primary key which is a UUID (stored in the id
field of the core schema).
-
Response Body:
HTTP/1.1 201 Created Content-Type: application/json Location: https://example.com/v1/User/uid=123456 ETag: "0" { "schemas":["urn:scim:schemas:core:1.0"], "id":"123456", "externalId":"bjensen", "meta":{ "version":0, "created":"2011-08-01T21:32:44.882Z", "lastModified":"2011-08-01T21:32:44.882Z" }, "name":{ "formatted":"Ms. Barbara J Jensen III", "familyName":"Jensen", "givenName":"Barbara" }, "userName":"bjensen" }
-
Response Codes:
201 - Created successfully 400 - Bad Request (unparseable, syntactically incorrect etc) 401 - Unauthorized
-
Request:
PUT /User/:id
-
Request Body:
Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 If-Match: "2" { "schemas":["urn:scim:schemas:core:1.0"], "id":"123456", "userName":"bjensen", "externalId":"bjensen", "name":{ "formatted":"Ms. Barbara J Jensen III", "familyName":"Jensen", "givenName":"Barbara", "middleName":"Jane" }, "emails":[ { "value":"bjensen@example.com" }, { "value":"babs@jensen.org" } ], "meta":{ "version":2, "created":"2011-11-30T21:11:30.000Z", "lastModified":"2011-12-30T21:11:30.000Z" } }
-
Response Body: As for create operation, returns the entire, updated record, with the Location header pointing to the resource.
-
Response Codes:
200 - Updated successfully 400 - Bad Request 401 - Unauthorized 404 - Not found
Note: SCIM also optionally supports partial update using PATCH.
-
Request:
PUT /User/:id/password
-
Request Body:
Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 { "schemas":["urn:scim:schemas:core:1.0"], "password": "newpassword" }
-
Response Body: Empty
-
Response Codes:
204 -Updated successfully 400 - Bad Request 401 - Unauthorized 404 - Not found
Note: SCIM specifies that a password change is a PATCH, but since this isn't supported by many clients, we have used PUT. SCIM offers the option to use POST with a header override - if clients want to send
X-HTTP-Method-Override
they can ask us to add support for that.
See SCIM - List/Query Resources
Get information about a user. This is needed by to convert names and email addresses to immutable ids, and immutable ids to display names. The implementation provides the core schema from the specification, but not all attributes are handled in the back end at present (e.g. only one email address per account).
Filters: note that, per the specification, attribute values are comma separated and the filter expressions can be combined with boolean keywords ("or" and "and").
-
Request:
GET /Users?attributes=:requestedAttributes&filter=:filter
-
Response Body (for
GET /Users?attributes=id&filter=emails.value eq bjensen@example.com
):HTTP/1.1 200 OK Content-Type: application/json { "totalResults":1, "schemas":["urn:scim:schemas:core:1.0"], "resources":[ { "id":"123456" } ] }
-
Response Codes:
200 - Success 400 - Bad Request 401 - Unauthorized
See SCIM - Deleting Resources.
-
Request:
DELETE /User/:id
-
Request Headers:
If-Match
theETag
(version id) for the value to delete -
Request Body: Empty
-
Response Body: Empty
-
Response Codes:
200 - Success 401 - Unauthorized 404 - Not found
Deleting accounts is handled in the back end logically using the active
flag, so to see a list of deleted users you can filter on that attribute (filters by default have it set to true), e.g.
- Request:
GET /Users?attributes=id,userName&filter=userName co 'bjensen' and active eq false
- Response Body: list of users matching the filter
An endpoint which returns the JWT token key, used by the UAA to sign JWT access tokens, and to be used by authorized clients to verify that the key came from the UAA.
This call is authenticated with client credentials using the HTTP Basic method.
-
Request:
GET /token_key
-
Request body: empty
-
Response body: example
HTTP/1.1 200 OK Content-Type: text/plain FYSDKJHfgdUydsFJSHDFKAJHDSF
OAuth2 proected resources which deal with listing and revoking access tokens. To revoke a token with DELETE
clients need to provide a token_id
(not the token value) which can be obtained from the token list via the corresponding GET
. This is to prevent token values from being logged in the server (DELETE
does not have a body).
-
Request:
GET /oauth/users/:username/tokens
-
Access: allowed by clients with
ROLE_ADMIN
and for users to see their own tokens (as long as the client hasROLE_ADMIN
) -
Request body: empty
-
Response body: a list of access tokens, example
HTTP/1.1 200 OK Content-Type: text/plain [ { "access_token": "FYSDKJHfgdUydsFJSHDFKAJHDSF", "token_id": "fkjhsdfgksafhdjg", "expires_in": 1234, "client_id": "vmc" } ]
-
Request:
DELETE /oauth/users/:username/tokens/:token_id
-
Access: allowed by clients with
ROLE_ADMIN
and for users to revoke their own tokens (as long as the client hasROLE_ADMIN
) -
Request body: empty
-
Reponse code: 204 (NO_CONTENT)
-
Response body: empty
HTTP/1.1 204 NO_CONTENT
-
Request:
GET /oauth/clients/:client_id/tokens
-
Access: allowed by clients with
ROLE_CLIENT
-
Request body: empty
-
Response body: a list of access tokens, example
HTTP/1.1 200 OK Content-Type: text/plain [ { "access_token": "KJHDGFKDHSJFUYTGUYGHBKAJHDSF", "token_id": "fkjhsdfgksafhdjg", "expires_in": 1234, "client_id": "www" } ]
-
Request:
DELETE /oauth/clients/:client_id/tokens/:token_id
-
Access: allowed by clients with
ROLE_CLIENT
-
Request body: empty
-
Reponse code: 204 (NO_CONTENT)
-
Response body: empty
HTTP/1.1 204 NO_CONTENT
-
Request:
GET /oauth/clients/:client_id
-
Access: allowed by clients or users with
ROLE_ADMIN
andscope=read
-
Request body: client details
-
Reponse code: 200 (OK) if successful with client details in JSON response
-
Response body: empty
HTTP/1.1 200 OK { client_id : foo, scope : [read,write], resource_ids : [cloud_controller,scim], authorities : [ROLE_CLIENT,ROLE_ADMIN], authorized_grant_types : [client_credentials] }
-
Request:
POST /oauth/clients/:client_id
-
Access: allowed by clients or users with
ROLE_ADMIN
andscope=write
-
Request body: client details
-
Reponse code: 201 (CREATED) if successful
-
Response body: empty
HTTP/1.1 201 CREATED
Example:
POST /oauth/clients/foo
{
client_id : foo,
client_secret : fooclientsecret, // optional for untrusted clients
scope : [read,write],
resource_ids : [cloud_controller,scim],
authorities : [ROLE_CLIENT,ROLE_ADMIN],
authorized_grant_types : [client_credentials],
}
-
Request:
PUT /oauth/clients/:client_id
-
Access: allowed by clients or users with
ROLE_ADMIN
andscope=write
-
Request body: client details
-
Reponse code: 204 (NO_CONTENT) if successful
-
Response body: empty
HTTP/1.1 204 NO_CONTENT
Example:
PUT /oauth/clients/foo
{
client_id : foo,
secret : fooclientsecret, // optional for untrusted clients
scope : [read,write],
resource-ids : [cloud_controller,scim],
authorities : [ROLE_CLIENT,ROLE_ADMIN],
authorized-grant-types : [client_credentials]
}
-
Request:
DELETE /oauth/clients/:client_id
-
Acce 8000 ss: allowed by clients or users with
ROLE_ADMIN
andscope=write
-
Request body: empty
-
Reponse code: 204 (NO_CONTENT)
-
Response body: empty
HTTP/1.1 204 NO_CONTENT
N.B. This section contains an initial proposal. These endpoints are not planned for the initial implementation phase.
Web app clients need UI endpoints for the OAuth2 and OpenID redirects. Clients that do not ask for a JSON content type will get HTML.
-
Request:
GET /login?error=:error
-
Response Body: form with all the relevant prompts
-
Response Codes:
200 - Success
-
Request:
POST /login
-
Request Body: depending on configuration (e.g. do we need OTP / PIN / password etc.)
username=:username&password=:password...
-
Response Header: includes location if redirect, and cookie for subsequent interaction (e.g. authorization)
Location: http://myapp.cloudfoundry.com/mycoolpage Set-Cookie: JSESSIONID=ldfjhsdhafgkasd
-
Response Codes:
302 - Found 200 - Success
-
Request:
GET /oauth/authorize/confirm
-
Request Body: HTML form posts back to
/oauth/authorize
Do you approve the application "foo" to access your CloudFoundry resources with scope "read_cloudfoundry"? Approve/Deny.
-
Response Codes:
200 - Success
The precise form of this request is not given by the spec (which just says "obtain authorization"), but the response is.
-
Request:
POST /oauth/authorize?user_oauth_approval=true
-
Request Header: needed to ensure the currently authenticated client is the one that is authorizing
Cookie: JSESSIONID=ldfjhsdhafgkasd
-
Response Header: location as defined in the spec (e.g. includes auth code for that grant type, and error information)
-
Response Codes:
302 - Found
-
Request:
GET /login
-
Response Header:
Location: http://www.google.com/etc/blah Set-Cookie: JSESSIONID=ldfjhsdhafgkasd
-
Response Codes:
302 - Found
Authentication is via HTTP basic using credentials that are configured
via varz.username
and varz.password
. The /varz
endpoint pulls
data out of the JMX MBeanServer
, exposing selected nuggets directly
for ease of use, and providing links to more detailed metrics.
-
Request:
GET /varz
-
Response Body:
{ "type": "UAA", "links": { "Users": "http://localhost:8080/uaa/varz/Users", "JMImplementation": "http://localhost:8080/uaa/varz/JMImplementation", "spring.application": "http://localhost:8080/uaa/varz/spring.application", "com.sun.management": "http://localhost:8080/uaa/varz/com.sun.management", "Catalina": "http://localhost:8080/uaa/varz/Catalina", "env": "http://localhost:8080/uaa/varz/env", "java.lang": "http://localhost:8080/uaa/varz/java.lang", "java.util.logging": "http://localhost:8080/uaa/varz/java.util.logging" }, "mem": 19173496, "memory": { "verbose": false, "non_heap_memory_usage": { "max": 184549376, "committed": 30834688, "init": 19136512, "used": 30577744 }, "object_pending_finalization_count": 0, "heap_memory_usage": { "max": 902299648, "committed": 84475904, "init": 63338496, "used": 19173496 } }, "token_store": { "refresh_token_count": 0, "access_token_count": 0, "flush_interval": 1000 }, "audit_service": { "user_authentication_count": 0, "user_not_found_count": 0, "principal_authentication_failure_count": 1, "principal_not_found_count": 0, "user_authentication_failure_count": 0 }, "spring.profiles.active": [] }
More detailed metrics can be obtained from the links in /varz
. All
except the env
link (the OS env vars) are just the top-level domains
in the JMX MBeanServer
. In the case of Catalina
there are some
known cycles in the object graph which we avoid by restricting the
result to the most interesting areas to do with request processing.
-
Request:
GET /varz/{domain}
-
Response Body: (for domain=Catalina)
{ "global_request_processor": { "http-8080": { "processing_time": 0, "max_time": 0, "request_count": 0, "bytes_sent": 0, "bytes_received": 0, "error_count": 0, "modeler_type": "org.apache.coyote.RequestGroupInfo" } } }
Beans from the Spring application context are exposed at
/varz/spring.application
.