Middleware JWT authorization

27.09.2021 • Barbora Bačenková • Security

...

A lot of people are mixing authentification and authorization. It´s a security process that has different purposes. However, they go hand in hand, and is needed to use both. Let’s take a closer look at how these concepts work  and why they are so important in the field of computer security.


Authentication | I am

Authentication verifies the identity of the user who wants to access the resource.

Authentication methods

  • Single-Factor/Primary Authentication
  • Two factor authentication (2FA)
  • Single Sign-On (SSO)
  • Multi-Factor Authentucation (MFA)
  • Password Authentication Protocol (PAP)
  • Challenge Handshake Authentication Protocol (CHAP)
  • Extensible Authentication Protocol (EAP)

Authorization | I can

Authorization proves whether the user is actually authorized to access or to perform any function.

Authorization methods

What we will discuss below is particularly useful information for all applications and web services in general. Essential part of a great user experience is that you can access all needed resources with confidence and security.

  • Authorization HTTP – person enters their username and password for authentication. This method doesn't include cookies, session IDs, or login pages.
  • Authorization API - when a user attempts to access system resources during registration, an API key is generated. The same key is paired with a token (identifier token) that is hidden. The combination of an API key and a hidden token is constantly used whenever a user authenticates and enters their environment which can use.
  • OAuth 2.0 - this method allows the API to authenticate and access the necessary system resources

Authorization JWT (JSON web token)

JSON Web Token is an open standard used for secure data transfer between different parties. The server generates a token that certifies the user identity, and sends it to the client. It is commonly used for authorization and uses pair of public-private keys. The owner of the private key (authentication part) should be higher company authority (like Active Directory). JWT has both - authentication and authorization support. Mainly API authentication, and server-to-server authorization.

This architecture proves to be very effective in modern web applications, where we perform API requests via REST after the user is authenticated.

As a company engaging in middleware, we work with authorization and authentication from ESB point of view (Enterprise service bus). ESB works in these two points of authorization/authentication view:

ESB is a REST API provider

  • Application (as API consumer) authenticates against the higher authority
  • ESB verifies token issuer identity by a public certificate
  • ESB authorizes possible actions by looking into the payload of JWT)
  • The application doesn't need any certificate

ESB is a REST API consumer

  • ESB authenticates against the higher authority
  • Application (as API provider) verifies token issuer identity by a public certificate
  • Application authorizes possible actions by looking into the payload of JWT
  • ESB doesn't need any certificate

In many cases, highly sensitive data such as bank, financial and business data are included. Data breach events are one of the biggest risks faced by systems.


Written by Barbora Bačenková

Barbora has experience in enterprise processes, team building, and company collaboration. Academic background in information management makes sure that complex IT projects such as technology updates and deployments are on time, and within budget.

Start spreading the wisdom

Related topics

middleware jwt authorization

Custom-made solution?

If you are interested in a custom-made solution, do not hesitate to contact us.

Contact us