Skip to content

Unity Security Use Cases

Galen Hollins edited this page Jun 1, 2022 · 16 revisions

Please use this page to determine which use case best applies to your particular security need. From this, you will be able to identify what technologies will be involved, and what adaptation code (if any) you will need to write.

App-to-App (service-to-service) Interaction.

In this case, there is a need to call/interact with one service endpoint, from another, in a non-human way.

For example, the "caller program" could be:

Service Area Implementation Requirements:

  • Must implement token refresh API calls in code
  • Must implement endpoint call in program(s)

The below diagram shows the high-level use case: Screen Shot 2022-05-12 at 1 19 22 PM

Human-to-UI Interaction.

In this case, a human user is accessing a web page such as:

  • HySDS UI
  • JupyterHub
  • or other web UI..

If the user doesn't already have a valid token, then they are required to log in via the Cognito login page, before accessing the target web page.

Service Area Implementation Requirements:

  • Simple code (e.g. JavaScript) needs to be added on the web application that does a redirect to Cognito. This code will also store the received tokens in the web browser.
  • In the case of JupyterHub, it already has built-in logic that does the redirection.
Screen Shot 2022-05-13 at 9 48 20 AM

Reverse Proxy Interaction.

In this case, a reverse proxy sits in front of a web application, and controls access to the application.

Service Area Implementation Requirements:

  • A reverse proxy needs to be deployed.
  • If specific resources need specific access control rules, then these rules can be added in the reverse proxy (configuration TBD).
Screen Shot 2022-05-13 at 9 47 29 AM .