Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Authentification mechanisms

 

The second part concerns a user and client management system for preventing undesired data manipulations within the internal infrastructure as well as protecting administrative operations.

While it is convinient for end-users to authentificate themselves over a login page applications require an automated process. Hereby, we introduce two authentification machanisms for end-users and applications, such as Flarecast services and algorithms.

Authentification MechanismUsed ByDescriptionProtection Level
Session LoginEnd-Users

Restricts the permission on specific routes by validating the session ID of a request. If an end-user does not hold an approved session ID he has to authenticate himself over a login page with a username and password. If the login was successful the end-user's session ID becomes active.

Web pages with restricted functions.
oAuth2ApplicationsRestricts the permission on specific routes by validating an access token within the request's header. If an application does not hold an active access token it has to request a token from the oAuth2 authentification server.Restricted REST resources.

While it is convinient for an end-user to login