Basic Auth approach quickly died in popularity in favour of form based login where browser cookies were used to maintain user session, rather than repeated re-transmission of the user-id and password for each web request. Basic Auth was clinically dead and ceased being the "state-of-the-art" method for authentication.
These days, now that non-browser based applications are increasing in popularity, one of the first asks by architects is support for Basic Authentication. It seems the Basic Authentication "zombie" lives on. Why is this? Is it for testing purposes?
Why should Basic Authentication die?
Well, for one, Basic Auth requires that web servers have access to "passwords" which have continually been shown to be one of the weakest security architecture. Further, it requires that the client application ask users directly for their user-id and password greatly increasing the points of attack a hacker might have. A user giving an application (whether a mobile application or a web site) their user-id and password is allowing that application the ability to impersonate the user. Further, we now know that password re-use continues to undermine this simple form of authentication.
There are better alternatives.
A better alternative uses "tokens", such as the cookies I mentioned above, to track client/user login state. An even better solution, not easily done with Basic Auth, is to use an adaptive authentication service whose job it is to evaluate not only a user's id and password, but can also evaluate multiple factors for authentication. This can go beyond the idea of something you know, to something you are, and something you have types of factors. Many service providers are even beginning to evaluate network factors as well, such as, has the user logged in from this IP address and geographical location before?
In order to take advantage of such an approach, the far better solution is to demand OAuth2 as a key part of your application security architecture for non-browser applications and APIs. Just like form-based authentication dramatically improved browser authentication in the 2000s, OAuth2 (RFC6749 and 6750), and its predecessor, Kerberos, provide a much better way for client applications to obtain tokens that can be used for authenticated access to web services.
Token authentication is far superior because:
- Tokens cleanly separate user authentication and delegation from the application's activities with web services.
- Tokens do not require that clients impersonate users. They can be highly scoped and restrictive in nature.
- The loss of a token, means only a single service is compromised where as the loss of a password compromises every site where a user-id and password is used.
- Tokens can be issued by multi-factor authentication systems.
- Tokens do not require access to a password data store for validation.
- Tokens can be cryptographically generated and thus can be validated by web services in a "stateless" fashion (not requiring access to a central security database).
- Tokens can be easily expired and re-issued.
RFC 2617 Basic Authentication is not only dead. It needs to be buried. Stop using it. You can do it!
Cross-posted from Oracle Fusion Blog.
Cross-posted from Oracle Fusion Blog.
Great post that concisely presents the issues.
In the light of your comments about demanding Oauth2 as a key part of the your application security architecture; have you any information on either Oauth2 support for Owsm policies in the Soa Suite / OSB or an example process that can easily be added (via Java callout etc.) to the custom token handling policies.
I wouldn't say I'm demanding OAuth2. OAuth2 is but one possible way to get rid of Basic Auth. My point was that going to Basic Auth for non-browser clients is actually a step backwards.
There are other issues at work here as well. Ever wanted to download an Oracle CD directly to your server that's in a data center while you're attached via VPN? Good luck. Until there's a good documted way to do this, basic auth won't die.
I admit, Oracle uses Basic Auth a lot. I'm voicing a personal opinion here. Not familiar with your case, but it seems like another place where RFC2617 Basic Auth should be upgraded to something better in both security and usability.
Post a Comment