Best way to create a TOKEN system to authenticate web service calls?

后端 未结 2 719
北恋
北恋 2020-12-12 18:34

I\'d like to create a web service architecture that can be called by various platforms such as mobile devices, winforms applications, iphone, blackberry, you name it. So go

相关标签:
2条回答
  • 2020-12-12 18:51

    If you're only using one token which is given by the server on the initial authentication, it can be used for any request if it's intercepted. Your only defense is the expiration time.

    Beyond that, it depends on what your implementation options are.

    A more secure system is to add a timestamp (and possibly a nonce) to each request, sign that, and include that with each request. It requires that the client handles the authentication credentials, knows the signing implementation, and signs each request.

    You could alternately have the server authenticate with each request (which could be done with OpenID) or hand out a number of tokens and re-authenticate when more are needed (which could be done with OAuth). If the client can store credentials, these can be invisible to the user. These are more complex, requiring an encrypted transport such as SSL for some of the interactions, and a client which can speak HTTP redirects and handle cookies or other stored state. The client wouldn't have to know how to sign, but if you can do SSL, you probably don't need the complexity in the first place.

    If you don't need to be client-agnostic, you probably want to sign requests.

    For signing implementations, examples, and libraries, look at Amazon Web Services, OpenID, or OAuth.

    Regarding the token expiration time, it depends on your needs. A longer token life increases the window replay attacks. A nonce makes a token single-use, but requires more state on the server.

    0 讨论(0)
  • 2020-12-12 19:13

    You should check out OAuth. It's a standard for API authentication, you can probably just plug an existing implementation into your service.

    0 讨论(0)
提交回复
热议问题