The Problem:
Serving a secure API to a client side app using only a local authentication strategy.
The red arrows are part of the knowledge gap.
Context:
That is --- client.example.com
is making a POST to api.example.com/login
where on success client.example.com
can gain access to a GET service like api.example.com/secret
.
An idea!
Implimentation of OAuth 2.0 with hybrid grant type sitting in front of API.
Why hybrid?
It wouldn't be an
Implicit Grant Flow
akaClient-Side Web Applications Flow
because there is no redirection to API server too grant access token. (i.e.) "Is it ok for so-and-so to access your data?"It wouldn't be a
Resource Owner Password Flow
because a Client ID and Client Secret are passed along with the request so it's assumed the client app is server-side.
OK... so what about a little bit of both?
What if we used a CRSF token on page load of client-side app, and POST it with user credentials too OAuth 2.0 authentication endpoint to exchange for access token? You would authenticate each subsequent request with the access token and CRSF token after a successful login.
A good Node.js OAuth 2.0 library I found:
https://github.com/ammmir/node-oauth2-provider
Help Me!
I can not find a working example of an authentication measure that solves this problem! Point me in the right direction?
Ultimately, the goal here is too authenticate a client side app to a REST api using CORS with a local strategy --- i.e. username & password --- even if the convention above isn't possible.
To Accommodate Bounty:
This is a client side app, so let's stay trendy.
I'm looking for a working example using the Node.js OAuth 2.0 seed above for the API/Auth server and a front end framework like Angular.js or Backbone.js to make requests.
The example should match the context described above.