Authentication Architecture Altinn Platform
Description of the Authentication architecture Altinn Platform
In Altinn Platform and Altinn Apps there is deployed applications and components that need to be able to authenticate users and systems accessing them.
This is needed when resources requiring authentication and authorization is requested.
This will typical be API’s that expose, or updates data owned by a specific party (person or organization)
Overall Authentication architecture
There are several requirements to an authentication architecture for Altinn Apps / Altinn Platform. The most important is
- Needs to be supported by different types of application frameworks
- Needs to support end users accessing Altinn Apps / Altinn Platform through a web browser running the REACT application
- Needs to be safe against XSS attacks.
- Needs to support scenarios where users are accessing through external systems or mobile apps
- Needs to support systems from org(s) that is authorized to perform application operations.
- Apps should not have access to secret so they can create their own token.
- Needs to support passing the identity to api’s that are consumed by Altinn Apps.
Since Altinn Platform will in the future support applications created by different frameworks (Java/.Net/Node ++++) it is important that the authentication mechanisms are supported by different types of platforms.
The JWTToken is created in an asymmetric process where the Authentication component will use a private key from a certificate to sign the token, and the different apps and components that needs to verify it will use the public key. See JWT Format for details on the algorithm used.
The application architecture below show how JWT flows between the different parts of the solutions.
End user using app frontend
For end user accessing the app through browser that loads app frontend, the authentication mechanism is based on using a protected cookie containing a JWT Token. ( HttpOnly and Secure)
The reason for putting the JWT token in the cookie for this scenarious is to protect against XSS attacks.
The cookie with the JWT token is created by Authentication component in the Altinn Platform solution.
The React application would need to refresh the token at given interval or the token will expire. To refresh a cookie token, the token API in Platform needs to be called
org systems accessing app and platform api’s
org (the entity owning the application) will have seperate API’s in a spp to perform operations on. They are authenticated with help of agency system id + password. A API in the authentication component in Altinn creates a JWT token that can be used to authenticate the agency system when calling api’s on apps running in Altinn Apps.
See Authentication API for details.
End user systems accessing app api’s
This solutions is yet to be finalized. The assumption is that the either the organization that own the system is authenticated and have a jwt token containing the organization number for that given organization or that the user using the system is authenticated and the systems send user token with request.
Authentication of Altinn Apps against Altinn Platform
Applications hosted in a Altinn Apps solution would in many cases need to authenticate the end user against the different Altinn Platform components.
The solution for this is that the Apps would forward the JWT Token from the bearer token or JWT Cookie to the component that is called. This would be forwarded as a bearer token in the Authorization header in the request against the component.
This makes it possible to configure JWTCookie authentication mechanismen to authenticate the end user also in the components.