mirror of
https://github.com/internetee/registry.git
synced 2025-06-08 05:34:46 +02:00
Add description for authentication endpoint
This commit is contained in:
parent
bb98825f76
commit
29e06d83c0
2 changed files with 144 additions and 0 deletions
24
doc/registrant-api.md
Normal file
24
doc/registrant-api.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Registrant API integration specification
|
||||
|
||||
REPP uses HTTP/1.1 protocol (http://tools.ietf.org/html/rfc2616) and
|
||||
Basic Authentication (http://tools.ietf.org/html/rfc2617#section-2) using
|
||||
Secure Transport (https://tools.ietf.org/html/rfc5246) with certificate and key
|
||||
(https://tools.ietf.org/html/rfc5280).
|
||||
|
||||
Credentials and certificate are issued by EIS (in an exchange for desired API
|
||||
username, CSR and IP).
|
||||
|
||||
To quickly test the API, use curl:
|
||||
|
||||
curl -q -k --cert user.crt.pem --key user.key.pem https://TBA/repp/v1/accounts/balance -u username:password
|
||||
|
||||
Test API endpoint: https://testepp.internet.ee/repp/v1
|
||||
Production API endpoint: TBA
|
||||
|
||||
Main communication specification through Restful EPP (REPP):
|
||||
|
||||
[Contact related functions](repp/v1/contact.md)
|
||||
[Domain related functions](repp/v1/domain.md)
|
||||
[Domain transfers](repp/v1/domain_transfers.md)
|
||||
[Account related functions](repp/v1/account.md)
|
||||
[Nameservers](repp/v1/nameservers.md)
|
120
doc/registrant-api/authentication.md
Normal file
120
doc/registrant-api/authentication.md
Normal file
|
@ -0,0 +1,120 @@
|
|||
# Authentication
|
||||
|
||||
## Authenticating with mobileID or ID-card
|
||||
|
||||
For specified partners the API allows for use of data from mobile ID for
|
||||
authentication. API client should perform authentication with eID according to
|
||||
the approriate documentation, and then pass on values from the webserver's
|
||||
certificate to the API server.
|
||||
|
||||
## POST /repp/v1/auth/eid/token
|
||||
|
||||
Returns a bearer token to be used for further API requests. Tokens are valid for 2 hours since their creation.
|
||||
|
||||
#### Paramaters
|
||||
|
||||
Values in brackets represent values that come from the id card certificate.
|
||||
|
||||
| Field name | Required | Type | Allowed values | Description |
|
||||
| ----------------- | -------- | ---- | -------------- | ----------- |
|
||||
| ident | true | String | | Identity code of the user (`serialNumber`) |
|
||||
| first_name | true | String | | Name of the customer (`GN`) |
|
||||
| last_name | true | String | | Name of the customer (`SN`) |
|
||||
| country | true | String | 'ee' | Code of the country that issued the id card (`C`) |
|
||||
| issuing authority | true | String | 'AS Sertifitseerimiskeskus' | |
|
||||
| | | | | |
|
||||
|
||||
|
||||
#### Request
|
||||
```
|
||||
POST /repp/v1/auth/token HTTP/1.1
|
||||
Accept: application/json
|
||||
Content-length: 0
|
||||
Content-type: application/json
|
||||
|
||||
{
|
||||
"ident": "30110100103",
|
||||
"first_name": "Jaan",
|
||||
"last_name": "Tamm",
|
||||
"country": "ee",
|
||||
"issuing authority": "AS Sertifitseerimiskeskus"
|
||||
}
|
||||
```
|
||||
|
||||
#### Response
|
||||
```
|
||||
HTTP/1.1 201
|
||||
Cache-Control: max-age=0, private, must-revalidate
|
||||
Content-Length: 0
|
||||
Content-Type: application.json
|
||||
|
||||
|
||||
{
|
||||
"access_token": "<SOME TOKEN>",
|
||||
"expires_at": "2018-07-13 11:30:51 UTC",
|
||||
"type": "Bearer"
|
||||
}
|
||||
```
|
||||
|
||||
## POST /repp/v1/auth/username/token -- NOT IMPLEMENTED
|
||||
|
||||
#### Paramaters
|
||||
|
||||
Values in brackets represent values that come from the id card certificate
|
||||
|
||||
| Field name | Required | Type | Allowed values | Description |
|
||||
| ----------------- | -------- | ---- | -------------- | ----------- |
|
||||
| username | true | String | Username as provided by the user | |
|
||||
| password | true | String | Password as provided by the user | |
|
||||
|
||||
|
||||
#### Request
|
||||
```
|
||||
POST /repp/v1/auth/token HTTP/1.1
|
||||
Accept: application/json
|
||||
Content-length: 0
|
||||
Content-type: application/json
|
||||
```
|
||||
|
||||
#### Response
|
||||
```
|
||||
HTTP/1.1 201
|
||||
Cache-Control: max-age=0, private, must-revalidate
|
||||
Content-Length: 0
|
||||
Content-Type: application.json
|
||||
|
||||
|
||||
{
|
||||
"access_token": "<SOME TOKEN>",
|
||||
"expires_at": "2018-07-13 11:30:51 UTC",
|
||||
"type": "Bearer"
|
||||
}
|
||||
```
|
||||
|
||||
## Implementation notes:
|
||||
|
||||
We do not need to store the session data at all, instead we can levarage AES encryption and use
|
||||
Rails secret as the key. General approximation:
|
||||
|
||||
```ruby
|
||||
class AuthenticationToken
|
||||
def initialize(secret = Rails.application.config.secret_key_base, values = {})
|
||||
end
|
||||
|
||||
def create_token_hash
|
||||
data = values.to_s
|
||||
|
||||
cipher = OpenSSL::Cipher::AES.new(256, :CBC)
|
||||
cipher.encrypt
|
||||
|
||||
encrypted = cipher.update(data) + cipher.final
|
||||
base64_encoded = Base64.encode64(encrypted)
|
||||
|
||||
{
|
||||
token: base64_encoded,
|
||||
expires_in = values[:expires_in]
|
||||
type: "Bearer"
|
||||
}
|
||||
end
|
||||
end
|
||||
```
|
Loading…
Add table
Add a link
Reference in a new issue