We want to use an existing server to authenticate requests to a new, second server. Both servers are trusted, proposed workflow is shown below.
We can assume in this example that Server 2 does not have access to Server 1's auth token database.
- User sends username / password to server 1, server responds with an auth token.
- User requests a resource from server 2, including auth token from server 1
- Server 2 checks with server 1 that auth token is valid
- If token is valid, server 2 responds with requested resource
Does this flow have a particular name? It doesn't quite seem to match any OAuth flow that I've seen.
Is this flow considered a good idea? If not, what alternative would be recommended?
This flow seems almost identical to that recommended in How should a Facebook user access token be consumed on the server-side? except we're not using Facebook here.