Statistics
| Branch: | Tag: | Revision:

root / docs / source / devguide.rst @ 462c63e8

History | View | Annotate | Download (8.3 kB)

1
Astakos Developer Guide
2
=======================
3

    
4
Introduction
5
------------
6

    
7
Astakos serves as the point of authentication for GRNET (http://www.grnet.gr) services. It is a platform-wide service, allowing users to register, login, and keep track of permissions.
8

    
9
Users in astakos can be authenticated via several identity providers:
10

    
11
* Local
12
* Twitter
13
* Shibboleth
14

    
15
It provides also an administrative interface for managing user accounts.
16

    
17
It is build over django and extends its authentication mechanism.
18

    
19
This document's goals are:
20

    
21
* present the overall architectural design.
22
* provide basic use cases.
23
* describe the APIs to the outer world.
24
* document the views and provide guidelines for a developer to extend them.
25

    
26
The present document is meant to be read alongside the Django documentation (https://www.djangoproject.com/). Thus, it is suggested that the reader is familiar with associated technologies.
27

    
28
Document Revisions
29
^^^^^^^^^^^^^^^^^^
30

    
31
=========================  ================================
32
Revision                   Description
33
=========================  ================================
34
0.1 (Jub 24, 2012)         Initial release.
35
=========================  ================================
36

    
37
Overview
38
--------
39

    
40
Astakos service co-ordinates the access to resources (and the subsequent permission model) and acts as the single point of registry and entry to the GRNET cloud offering, comprising of Cyclades and Pithos subsystems.
41

    
42
It also propagates the user state to the Aquarium pricing subsystem.
43

    
44
.. image:: images/~okeanos.jpg
45

    
46
Registration Use Cases
47
----------------------
48

    
49
The following subsections describe two basic registration use cases. All the registration cases are covered in :ref:`registration-flow-label`
50

    
51
Invited user
52
^^^^^^^^^^^^
53

    
54
A registered ~okeanos user, invites student Alice to subscribe to ~okeanos services. Alice receives an email and through a link is navigated to Astakos's signup page. The system prompts her to select one of the available authentication mechanisms (Shibboleth, Twitter or local authentication) in order to register to the system. Alice already has a Shibboleth account so chooses that and then she is redirected to her institution's login page. Upon successful login, her account is created.
55

    
56
Since she is invited his account is automaticaly activated and she is redirected to Astakos's login page. As this is the first time Alice has accessed the system she is redirected to her profile page where she can edit or provide more information.
57

    
58
Not invited user
59
^^^^^^^^^^^^^^^^
60

    
61
Tony while browsing in the internet finds out about ~okeanos services. He visits the signup page and since his has already a twitter account selects the twitter authentication mechanism and he is redirected to twitter login page where he is promted to provide his credentials. Upon successful login, twitter redirects him back to the Astakos and the account is created.
62

    
63
Since his not an invited user his account has to be activated from an administrator first, in order to be able to login. Upon the account's activation he receives an email and through a link he is redirected to the login page.
64

    
65
Authentication Use Cases
66
------------------------
67

    
68
Cloud service user
69
^^^^^^^^^^^^^^^^^^
70

    
71
Alice requests a specific resource from a cloud service ex. Pithos. In the request supplies the `X-Auth-Token`` to identify whether she is eligible to perform the specific task. The service contacts Astakos through its ``/im/authenticate`` api call (see :ref:`authenticate-api-label`) providing the specific ``X-Auth-Token``. Astakos checkes whether the token belongs to an active user and it has not expired and returns a dictionary containing user related information. Finally the service uses the ``uniq`` field included in the dictionary as the account string to identify the user accessible resources. 
72

    
73
.. _registration-flow-label:
74

    
75
Registration Flow
76
-----------------
77

    
78
.. image:: images/signup.jpg
79
    :scale: 150%
80

    
81
Login Flow
82
----------
83
.. image:: images/login.jpg
84
    :scale: 150%
85

    
86
.. _authentication-label:
87

    
88
Astakos Users and Authentication
89
--------------------------------
90

    
91
Astakos incorporates django user authentication system and extends its User model.
92

    
93
Since username field of django User model has a limitation of 30 characters, AstakosUser is **uniquely** identified by the ``email`` instead. Therefore, ``astakos.im.authentication_backends.EmailBackend`` is served to authenticate a user using email if the first argument is actually an email, otherwise tries the username.
94

    
95
A new AstakosUser instance is assigned with a uui as username and also with a ``auth_token`` used by the cloud services to authenticate the user. ``astakos.im.authentication_backends.TokenBackend`` is also specified in order to authenticate the user using the email and the token fields.
96

    
97
Logged on users can perform a number of actions:
98

    
99
* access and edit their profile via: ``/im/profile``.
100
* change their password via: ``/im/password``
101
* invite somebody else via: ``/im/invite``
102
* send feedback for grnet services via: ``/im/send_feedback``
103
* logout (and delete cookie) via: ``/im/logout``
104

    
105
User entries can also be modified/added via the administrative interface available at ``/im/admin``.
106

    
107
A superuser account can be created the first time you run the ``manage.py syncdb`` django command. At a later date, the ``manage.py createsuperuser`` command line utility can be used.
108

    
109
Internal Astakos requests are handled using cookie-based django user sessions.
110

    
111
External systems in the same domain can delgate ``/login`` URI. The server, depending on its configuration will redirect to the appropriate login page. When done with logging in, the service's login URI should redirect to the URI provided with next, adding user and token parameters, which contain the email and token fields respectively.
112

    
113
The login URI accepts the following parameters:
114

    
115
======================  =========================
116
Request Parameter Name  Value
117
======================  =========================
118
next                    The URI to redirect to when the process is finished
119
renew                   Force token renewal (no value parameter)
120
======================  =========================
121

    
122
External systems outside the domain scope can acquire the user information by a cookie set identified by ASTAKOS_COOKIE_NAME setting.
123

    
124
Finally, backend systems having acquired a token can use the :ref:`authenticate-api-label` api call from a private network or through HTTPS.
125

    
126
The Astakos API
127
---------------
128

    
129
All API requests require a token. An application that wishes to connect to Astakos, but does not have a token, should redirect the user to ``/login``. (see :ref:`authentication-label`)
130

    
131
.. _authenticate-api-label:
132

    
133
Authenticate
134
^^^^^^^^^^^^
135

    
136
==================== =========  ==================
137
Uri                                  Method     Description
138
==================== =========  ==================
139
``/im/authenticate`` GET        Authenticate user using token
140
==================== =========  ==================
141

    
142
|
143

    
144
====================  ===========================
145
Request Header Name   Value
146
====================  ===========================
147
X-Auth-Token          Authentication token
148
====================  ===========================
149

    
150
Extended information on the user serialized in the json format will be returned:
151

    
152
===========================  ============================
153
Name                         Description
154
===========================  ============================
155
username                     User uniq identifier
156
uniq                         User email (uniq identifier used by Astakos)
157
auth_token                   Authentication token
158
auth_token_expires           Token expiration date
159
auth_token_created           Token creation date
160
===========================  ============================
161

    
162
Example reply:
163

    
164
::
165

    
166
  {"username": "4ad9f34d6e7a4992b34502d40f40cb",
167
  "uniq": "papagian@example.com"
168
  "auth_token": "0000",
169
  "auth_token_expires": "Tue, 11-Sep-2012 09:17:14 ",
170
  "auth_token_created": "Sun, 11-Sep-2011 09:17:14 "}
171

    
172
|
173

    
174
=========================== =====================
175
Return Code                 Description
176
=========================== =====================
177
204 (No Content)            The request succeeded
178
400 (Bad Request)           The request is invalid
179
401 (Unauthorized)          Missing token or inactive user
180
500 (Internal Server Error) The request cannot be completed because of an internal error
181
=========================== =====================