Securing the Management API¶
The Management API of ESB Micro Integrator is the internal REST API.
The API Controller and the Micro Integrator dashboard communicates with this service to obtain administrative information of the server instance and to perform various administration tasks. If required, you can directly access the management API without using the dashboard or CLI.
See the topics given below information on securing the management API.
Authentication (JWT)¶
Info
User authentication in the management API uses the file-based user store by default. If required, you can configure an LDAP or RDBMS user store.
JWT-based user authentication is enabled for the management API by default. This ensures that users that log in to the management API or log out will be authenticated.
The following resources of the API handles login and logout:
/login
: This resource is used to obtain a JWT token for the provided user name and password and it is protected by basic auth./logout
: This resource is used to revoke the JWT token.
When you access the management API directly, you must first acquire a JWT token with your valid username and password. To log out of the management API, this token must be revoked. See securely invoking the management API for more information.
When you use the Micro Integrator Dashboard or the API Controller, JWT token-based authentication is handled internally.
Disable user authentication¶
Note
The management API and related tools (the CLI and the dashboard will not be accessible if authentication is disabled.
If security is not required, you can simply disable the handler for the Micro Integrator. Open the deployment.toml
file (stored in the MI_HOME/conf/
directory) and add the following configuration:
[management_api.jwt_token_security_handler]
enable = false
Update token store configurations¶
Add the following configuration section to the deployment.toml
file and change the default values.
[management_api.jwt_token_security_handler]
token_store_config.max_size= "200"
token_store_config.clean_up_interval= "600"
token_store_config.remove_oldest_token_on_overflow= "true"
token_config.expiry= "3600"
token_config.size= "2048"
Parameter | Description |
---|---|
max_size |
Number of tokens stored in the in memory token store. User can increase or decrease this value accordingly. |
clean_up_interval |
Token cleanup will be handled through a seperate thread and the frequency of the token clean up can be configured from this setting. This will clean all the expired and revoked security tokens. The thread will run only when there are tokens in the store. If it is empty, the cleanup thread will automatically stop. Interval is specified in seconds. |
remove_oldest_token_on_overflow |
If set to true , this will remove the oldest accessed token when the token store is full. If it is set to false , the user should either wait until other tokens expire or increase the token store max size accordingly.
|
expiry |
This configures the expiry time of the token (specified in seconds). |
size |
Specifies the key size of the token. |
Authorization¶
Note
Authorization does not apply to users in the default file-based user store. Therefore, be sure to configure an LDAP or RDBMS user store if you want authorization to be effective.
Authorization can be set for resources that only need to be invoked by admin users. The /management/users
resource is by default secured with authorization, meaning that only users with admin privileges can access this resource.
Disable authorization¶
Add the following to the deployment.toml
file.
[management_api.authorization_handler]
enable = false
Enable authorization for other resources¶
If you want to enable authorization for any resources other than /users
, open the deployment.toml
file (stored in
the MI_HOME/conf/
directory) and add the following:
Tip
Note that the /users
resource is secured by default. However, you need to redefine the /users
resource (as shown below) in cases where you need to customize the resources that need authorization. Failing to do so will remove authorization from the /users
resource.
[[management_api.authorization_handler.resources]]
path = "/users"
[[management_api.authorization_handler.resources]]
path = "/apis"
Configuring CORS¶
CORS is enabled for the management API by default. The default configuration allows all origins (denoted by the *
symbol). The Authorization
header is also enabled by default to cater to the functionalities of the the Micro Integrator dashboard.
Add the following to the deployment.toml
file and update the values.
[management_api.cors]
enabled = true
allowed_origins = "https://127.0.0.1:9743,https://wso2.com:9743"
allowed_headers = "Authorization"
Top