authors | state |
---|---|
Ryan Clark (ryan.clark@goteleport.com), Lisa Kim (lisa@goteleport.com) |
implemented |
This is an overview of the authn flow used through the Teleport Web UI for setting the relevant cookies for when a user accesses an application.
To document and understand the HTTP application access authn flow for future reference.
- Original AAP document about session
When a user wants to access an application, the authn flow to this application involves a series of redirects to ultimately set the two cookies required to authenticate requests to the target application:
- Application session cookie
__Host-grv_app_session
: Stores the application web session's id. - Application session subject cookie
__Host-grv_app_session_subject
: Stores the application web session's bearer token. This was required to use as a secret to prevent an auditor from hijacking user sessions, since we log the session id in our audit log.
If authenticating requests to the target application fails (missing/invalid cookies), Teleport will redirect the user to the Teleport webapp's AppLauncher.tsx.
The Teleport webapp, may redirect the user to the login screen first before loading the AppLauncher.tsx
. The handler that creates application web session requires that the user is authenticated and has a valid web session. After logging in, the webapp will redirect user back to the AppLauncher.tsx
.
The AppLauncher.tsx
conducts the initial app authn flow and does the following:
AppLauncher.tsx
navigates to app route/x-teleport-auth
that initiates the Oauth likestate
exchange/x-teleport-auth
responds by redirecting user back toAppLauncher.tsx
with a query paramstate
(a query param that preserves the originally requested URL path & query) and with a short livedstate
cookieAppLauncher.tsx
makes a request to create an application web session- Lastly,
AppLauncher.tsx
navigates back to app route/x-teleport-auth
passing thestate
, the originally requested URL path & query, and the application web session response via URL params
OAuth like state
exchange pattern is used to protect the app route /x-teleport-auth
from CSRF. The authn flow uses two HTTP methods:
- GET:
begins
the authn flow. Performs two different actions:- If the request URL does not contain
state
query param, it creates a random token and redirects the user back to theAppLauncher.tsx
with both astate
query param and astate
cookie set with the random token value - If the
state
query param is present, it serves aapp redirection HTML
(contains inline JS that runs after page is loaded)
- If the request URL does not contain
- POST:
completes
the authn flow. This method is called within the inline JS served by the GET method and does the following:- checks that the
state
value passed via request body matches the value found instate
cookie (double submit cookie method) - validates the app session values passed via request body (session ID and bearer token)
- sets the required app cookies with the validated app session values
- upon any error encountered related to missing cookies, tokens, and mismatching expected values, an audit event will be emitted as auth attempt failure, and delete's app session if a session ID was provided.
- checks that the
The app redirection HTML
is just a blank HTML page with an inline JS that runs upon loading. The JS makes a fetch-based POST request to /x-teleport-auth
with a JSON body containing the state
value, the session id, and the session bearer token. After successful validation of these values in the backend, the handler completes the authn flow by setting the required app cookies. After returning from the request, the JS will redirect the user to the originally requested URL.
It's important to note that browser's will now block 3rd party cookies
by default. But all the cookies we set during this authn flow are considered first party cookies
. That's because we first navigate to the app's domain (by app route /x-teleport-auth
), and then we set the cookie while we are still at the app domain.
A visual flow below using the debug dumper app as an example dumper.localhost:3080
. Note that there is two ways to begin the flow:
- Directly navigating to the application eg: copy paste URL or clicking on a app link
- User clicks on the app
launch
button in the Teleport Web UI
sequenceDiagram
participant Browser
box Proxy
participant Web Handler
participant App Handler
end
participant Auth Server
alt Directly navigating to application
Note left of Browser: User copy pastes app URL into browser <br/>https://dumper.localhost:3080
Browser->>App Handler: Proxy determines requesting an application and builds a redirect URL to AppLauncher.tsx
App Handler->>Browser: REDIRECT /web/launch/dumper.localhost?path=<requested-path>&query=<requested-query>
Note left of Browser: At AppLauncher.tsx <br>/web/launcher/dumper.localhost?path=...
else Using the web launcher
Note left of Browser: In the web UI user clicks on `launch` button for the target app
Note left of Browser: Web UI routes to AppLauncher.tsx <br/>/web/launch/dumper.localhost/cluster-name/dumper.localhost<br/>route format: /web/launch/:fqdn/:clusterId?/:publicAddr?
end
Note left of Browser: AppLauncher.tsx navigates to app authn route <br/>https://dumper.localhost:3080/x-teleport-auth
Browser->>App Handler: GET dumper.localhost/x-teleport-auth<br>Creates state token
App Handler->>Browser: REDIRECT /web/launch/dumper.localhost/cluster-name/dumper.localhost?state=<TOKEN><br>set cookie with the same <TOKEN>
Note left of Browser: Back at AppLauncher.tsx
Browser->>Web Handler: POST /v1/webapi/sessions/app with body:<br>{fqdn: dumper.localhost, public_addr: dumper.localhost, cluster_name: cluster-name}
Web Handler->>Auth Server: CreateAppSession
Auth Server->>Web Handler: Returns created session
Web Handler->>Browser: Returns with the app <SESSION_BEARER_TOKEN> and <SESSION_ID> as JSON response
Note left of Browser: AppLauncher.tsx navigates back to app authn route with:<br>https://dumper.localhost:3080/<br>x-teleport-auth?<br>state=<TOKEN><br>&subject=<SESSION_BEARER_TOKEN><br>&path=<ORIGINAL_PATH_QUERY><br>#35;value=<SESSION_ID>
Browser->>App Handler: GET dumper.localhost:3080/x-teleport-auth?state=<TOKEN>&subject=<SESSION_BEARER_TOKEN>#35;value=<SESSION_ID>
App Handler->>Browser: Serve the app redirection HTML <br>(Just a blank page with inline JS that contains logic to complete auth exchange and redirect to target app path)
Note left of Browser: App redirection HTML is loaded at <br>https://dumper.localhost:3080/x-teleport-auth...
Browser->>App Handler: POST dumper.localhost:3080/x-teleport-auth with body:<br>{state_value: <TOKEN>, subject_cookie: <SESSION_BEARER_TOKEN>, cookie_value: <SESSION_ID>}
alt Missing cookies or mismatching token
App Handler->>Auth Server: Delete app session and emit audit event
else Authentication successful
App Handler->>Browser: Set the subject cookie with SESSION_BEARER_TOKEN and the session cookie with SESSION_ID
end
Note left of Browser: App redirection HTML redirects user back to the <br>originally requested path
Note left of Browser: User is now at: https://dumper.localhost:3080