Ask HN: How do you currently solve authentication?
114 points| scottmotte | 6 years ago
Any tools you swear by? Anything you recommend? Anything you hate? Do you recommend writing it from scratch or using a framework or service?
114 points| scottmotte | 6 years ago
Any tools you swear by? Anything you recommend? Anything you hate? Do you recommend writing it from scratch or using a framework or service?
[+] [-] kisamoto|6 years ago|reply
Firebase Authentication[1] is an excellent easy add on for apps (both Web and Mobile) that I want to get running quickly. It's free, scales, supports lots of social auth providers and can take care of email verification etc.
When I'm building a website it really depends. Wordpress and Django have excellent inbuilt authentication and authorization systems. Djangos can be quickly expanded to support social providers with `django-allauth`[2]
For everything else I use KeyCloak[3] - Red Hats open source Identity Provider/Single Sign On which supports oAuth2.0, OpenID Connect, SAML, themes etc. Documentation and support is relatively good but can be quite overwhelming especially if you're not used to the relevant standards (knowing the different flows in oAuth2.0 and which one you want to use).
[Self plug]: I'm building a KeyCloak-as-a-Service for those who don't want control of their authentication without the hassle of setting up their own cluster. We're in closed Beta at the moment but if you're interested you can search for "Tromsso keycloak"[4] and leave an email to be invited in.
[1] https://firebase.google.com/docs/auth/
[2] https://github.com/pennersr/django-allauth
[3] https://keycloak.org/
[4] https://tromsso.com/
[+] [-] nujabe|6 years ago|reply
I can't say enough good things about this service as it has been a game changer for me productivity wise.
-Supports most of the popular OAuth providers natively or you can add any custom OAuth system via custom tokens.
-SMS Auth, passwordless login (aka magic links)
-Excellent and well maintained client/server SDKs for most of the languages. Makes user management very convenient, including neat things like revoking tokens, cookie session management, linking accounts of users with multiple providers, RBAC via web tokens.
-Tight integration with Firestore. Can have fine grained security controls on which users can read/write what documents etc.
What takes the cake is Custom Tokens [1]. This is really useful for seamlessly integrating with another authentication system. Would recommend anyone to take a look if they're exploring an auth service.
[1] https://firebase.google.com/docs/auth/admin/create-custom-to...
[+] [-] vbezhenar|6 years ago|reply
[+] [-] XMPPwocky|6 years ago|reply
How do you mitigate credential stuffing attacks? Throttling per account? Globally? By source IP?
A user leaves their company. How do you automatically deactivate their account?
You're using password hashes. Cool. A secure password hash function, right? Scrypt, argon2, maybe bcrypt? (MD5, SHA1, and SHA2 are not password hashes.)
You're comparing them in constant time, right? Are you sure? The compiler hasn't "optimized" you into problems here?
You're working with enterprise websites. You obviously support 2FA; and you're probably going to want to support SSO with SAML2, and definitely integrate with Active Directory over LDAP.
And your password reset flow- just send an email with a magic link? do you generate the magic link's token with a CSPRNG? Is it long enough? When does it expire? And admins probably have to be able to reset anybody's password, but with strong auditing and accountability features...
You store user info in the session information- basically caching it out of the database? How do you invalidate sessions after a user changes their password or has their account disabled?
Can somebody put Unicode in their password?
You're writing a POST handler. You protect against CSRF, right? (yes, tricking somebody into logging in as another user can be very useful!)
Doesn't seem so simple to me...
[+] [-] onion2k|6 years ago|reply
- limiting login attempts with a die off time between tries
- blocking automated brute force login attacks
- verifying accounts by email on sign up / invitation
- verifying username and password changes by email
- a friendly forgotten password workflow
- supporting even one basic 2FA factor (especially important on enterprise)
- logging user activity
- permission management
You could easily write all those things yourself. None of them are very complicated. But if you get any of them wrong it's very, very bad. Why wouldn't you use something that thousands of people have tested already?
[+] [-] sammorrowdrums|6 years ago|reply
[+] [-] thephyber|6 years ago|reply
Auth is ridiculously complex, is the source of MANY critical security defects, has plenty of frameworks which solve significant parts of it, and always seems easy until someone explains to you what all you didn’t know you needed.
Components:
- login page
- two factor state
- password reset form
- username lookup form
- logic for 401 status
- logic for 403 status
- throttling, is ban, user lockouts, and/or captchas for the forms you don’t want attacked at scale
- if you are storing credentials on your server (like password hashes), you better know what the options are for hashes, what a salt is, have investigated bcrypt and scrypt, know what happened when any of the thousands of large websites had their user databases leaked
- maybe support warning users that their credentials in your DB matches a record in HaveIBeenPwned and lock down their account until they password reset using their email address
- have a plan for when the hash you chose is deprecated in a few years while you aren’t paying attention and need to spent days re-coding to support new hash and legacy hash users, auto-migrating the legacies on next login
- want to support multiple 3rd party IDPs as well as local password auth? That starts to explode complexity and the number of forms.
- want to support SSO for enterprise? Use a framework that already supports SAML integration
[+] [-] Kiro|6 years ago|reply
[+] [-] tus88|6 years ago|reply
[deleted]
[+] [-] rmdashrfstar|6 years ago|reply
[+] [-] cs02rm0|6 years ago|reply
I'd never write it from scratch. It's always a PITA, there's always significant compromises - do you make people sign up, do you let them use Google/every other available federated login provider, what 2FA options, will it work on a locked down network, etc.
[+] [-] thephyber|6 years ago|reply
The APIs seem fine, but you still need to build a GUI to replace all of the flows.
Okta is a far more mature solution for something directly customer facing and supports better 2FA options.
[+] [-] friedman23|6 years ago|reply
[+] [-] javajosh|6 years ago|reply
I get so depressed with authentication complexity. Seems to me there are two ways to avoid it: first, write a service that doesn't care about user identity (it is a fun exercise to think of such a thing!), and second, secure messages, not connections or sessions.
Securing messages with public/private key encryption, I believe, is the best possible general approach. Thinking in messages yields the programmer great benefits, not just inside code (it is the cornerstone of the OOP paradigm, after all), but outside of code (message passing is also the cornerstone of distributed programming). Even if you are building a webapp it helps to think in terms of something more general. HTTP becomes just another channel over which messages move. Your app can (and probably will) become sensitive to other channels: email, SMS, webhooks, etc. If you embrace message-level security then you can ignore the channel and deal with the message. Channels may change, but your application code doesn't need to.
For an SPA, the key problem (no pun intended) is that a users private key is on the users browser, in the simplest implementation, accessible by everything on the page. If you're not end-to-end encrypted and don't use 3rd party resources at all (its possible!) then the naive solution is fine. The most robust solution is to use a browser extension to isolate the private key. The site requests encryption services from the extension.
Another fun and interesting problem is the multi-device user. Do we allow copying the private key, and if not, how do we associate private keys together? I think this is a fun problem from lots of angles, particularly the prospect of your own devices inviting each other to share an identity.
[+] [-] ajessup|6 years ago|reply
[+] [-] scottmotte|6 years ago|reply
[+] [-] sansnomme|6 years ago|reply
[+] [-] fantyoon|6 years ago|reply
I suppose if I worked on projects that wanted to support OAuth I would use Passport.js, but I don't know how much I would trust the any but the largest packages for that.
[+] [-] domlebo70|6 years ago|reply
[+] [-] folkhack|6 years ago|reply
I've rolled a lot of different custom authentication solutions for small apps with a handful of users all the way up to millions of users and thousands of concurrent sessions... having an "out-of-box" service saves a TON of time and headache =)
Not affiliated with Auth0, just love it to all heck. The free-tier offering is very fully-featured - try it out!
[+] [-] muse900|6 years ago|reply
I think it’s important to make good decisions at the very start.
I am definitely not against auth0 and I think it’s great, just think well enough before using it because it might come free at the start but after you acquire more users it comes at a hefty price
[+] [-] chauffer|6 years ago|reply
[+] [-] skyfantom|6 years ago|reply
[+] [-] ksec|6 years ago|reply
[1] http://rodauth.jeremyevans.net/why.html
[+] [-] hugofloss|6 years ago|reply
[+] [-] kcolford|6 years ago|reply
[+] [-] zwarag|6 years ago|reply
A friend of mine showed me some "dapps"(decentralized apps) that he uses (uniswap.io, axieinfinity.com and some other i forgot). They all used metamask as the "login platform". The point is that you have your key in this metamask plugin that is stored in your browser and you can sign things. That means you get a challenge from the server and metamask then asks you if you want to sign that challenge. The hole onboarding experience was super easy and you theoretically could use that to pay for some premium features of a service.
I thought that is really cool because you don't need to enter email, username, password and whatnot. You just click authorize and you're in.
[+] [-] gremlinsinc|6 years ago|reply
[+] [-] clintonb|6 years ago|reply
[+] [-] rgovostes|6 years ago|reply
https://python-social-auth.readthedocs.io/en/latest/
[+] [-] anticodon|6 years ago|reply
[+] [-] danpalmer|6 years ago|reply
We have sign in with Facebook, but implemented ourselves, total of about 200 lines of code plus tests, which was worth it to us to own over having a dependency.
We have various custom additions to the auth flows which have meant the decision to stay with Django’s auth and not use complex extensions such as social-auth or all-auth have paid off enormously.
We use python social auth on internal Django based sites for simple Google SSO, but they have far fewer requirements around auth, and aren’t performance sensitive at all.
[+] [-] unknown|6 years ago|reply
[deleted]
[+] [-] pharaohgeek|6 years ago|reply
[+] [-] bobsoap|6 years ago|reply
[+] [-] sarakayakomzin|6 years ago|reply
[+] [-] etherio|6 years ago|reply
[0] https://github.com/sorcery/sorcery/
[+] [-] anonymoushn|6 years ago|reply
[+] [-] tooop|6 years ago|reply
[+] [-] forgotmypw|6 years ago|reply
I use a multi-layer authentication system with various levels of compatibility, security, and accessibility.
* The default mode is unauthenticated, which allows the user to post plaintext. Optionally, this can be backed by a device fingerprint, which would group all of this user's posts together. This is supported by all post-Mosaic browsers, except perhaps Mosaic 1.0, which does not support HTML forms. (For Mosaic, there is a fallback writing mode, of the form http://example.com/your+message+here)
* There is also a cookie-based authentication system, in which the user asks for a new ID, and the server sets cookies for user id and checksum. The checksum is checked against a server secret via hashing, so no storage of account data is needed on the server. This works with all cookie-supporting browsers.
* The other authentication system is based on PGP, and allows the user to either use in-browser PGP (insecure) or client-based PGP (less insecure) to sign their messages. These messages can be both client verified and grouped together into a profile on the server.
[+] [-] polishdude20|6 years ago|reply
[+] [-] jchw|6 years ago|reply
I actually don’t know if you need this if you just want to identify the used, off hand; I know there is a separate flow for that when using OIDC, but I suspect it still would have at least a Client ID. (This would be used for the provider to display your application name and possibly some other info.)
[+] [-] vbsteven|6 years ago|reply