Simpler Sync Server authentication mechanism? #1127
Replies: 2 comments 2 replies
-
I think this is very reasonable. You could pass a token currently as URL parameter but I would expect most servers are more likely to expect a token as a header. As different servers may want the token to be passed in different headers, we could instead provide a config key to send any arbitrary headers with requests (excluding a few important ones such as |
Beta Was this translation helpful? Give feedback.
-
Just wanted to say thanks for implementing #1143 @russellhancox , I tested it earlier as a way to authenticate to an Azure API Management gateway, worked perfectly!
|
Beta Was this translation helpful? Give feedback.
-
My understanding of Santa communication to the Sync Server at the moment is you can leave it unauthenticated (for scenarios where it's inside your network perhaps) or use mutually authenticated TLS (client cert auth).
For born-in-the-cloud organisations or those aiming for cloud-only, setting up an always-on VPN or Certificate Authority with client cert deployment infrastructure is not really desirable and for smaller companies perhaps out of reach altogether.
So how about allowing for bearer token or API key authentication instead? A new configuration key like "bearer-token" could be added that when populated would cause the sync service to include that token in all requests to the Sync Server. An MDM can be used to push a single bearer token to all devices, or something more creative to make them unique per device, but that's up to whomever is setting up the MDM and Sync Server. This would not be as secure as mutual TLS, but for small organisations it should be more than sufficient and makes for a much easier entry point to Santa.
I think this change would be relatively easy to implement and is unlikely to break any existing Sync Servers.
Thoughts?
Beta Was this translation helpful? Give feedback.
All reactions