-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add accessToken support #3
Comments
To support OAuth2-based authentication, the connector should probably support authentication via cookies too. |
|
👍 for sugar |
Ideally, the connector should detect |
The subject discussed here applies to the following scenario? A user (using a client/browser) needs to access a model that do not exists in backend "local" database, which access another LB instance through remote connector to fetch the data. Problem: the first backend (who receives browser requests) needs to access the remote one using the user access token, so the remote ACLs, validation and business logic could apply correctly. If I understand well, the access token used by remote connector is done at datasource level (e.g. in a boot script), but in this scenario it should be done dynamically, according to the access token sent by the browser for each concurrent request. |
So you have a proxy-like server that receives a client request from a browser and you want to forward it to another loopback backend, while preserving the identity (authentication) of the client that made the request. Like for example, to forward the The discussion above deals only with the client side (e.g. in the browser), so that |
@bajtos Ok, thanks. The scenario I mentioned is ok conceptually and should be moved to another issue on remote connector? |
Yes please. |
hi @ALL https://www.npmjs.com/package/loopback-rest-remote-auth-token Tests are very welcome ;) |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This issue has been closed due to continued inactivity. Thank you for your understanding. If you believe this to be in error, please contact one of the code owners, listed in the |
Clients should set the
Authorization
header using the current user'saccessToken.id
. This will require a couple of new APIs in loopback and strong-remoting.Related: strongloop/strong-remoting#105 and strongloop/loopback-example-offline-sync#45
The text was updated successfully, but these errors were encountered: