Apache HTTP Server Version 2.4
Available Languages: fr
Description: | Allows a FastCGI authorizer application to handle Apache httpd authentication and authorization |
---|---|
Status: | Extension |
Module Identifier: | authnz_fcgi_module |
Source File: | mod_authnz_fcgi.c |
Compatibility: | Available in version 2.4.10 and later |
This module allows FastCGI authorizer applications to authenticate s and authorize access to resources. It s generic FastCGI authorizers which participate in a single phase for authentication and authorization as well as Apache httpd-specific authenticators and authorizors which participate in one or both phases.
FastCGI authorizers can authenticate using id and , such as for Basic authentication, or can authenticate using arbitrary mechanisms.
The invocation modes for FastCGI authorizers ed by this module are distinguished by two characteristics, type and auth mechanism.
Type is simply authn
for authentication, authz
for authorization, or authnz
for combined authentication and authorization.
Auth mechanism refers to the Apache httpd configuration mechanisms and processing phases, and can be AuthBasirovider
, Require
, or check__id
. The first two of these correspond to the directives used to enable participation in the appropriate processing phase.
Descriptions of each mode:
authn
, mechanism AuthBasirovider
FCGI_ROLE
is set to AUTHORIZER
and FCGI_APACHE_ROLE
is set to AUTHENTICATOR
. The application must be defined as provider type authn using AuthBasirovider
. When invoked, the application is expected to authenticate the client using the provided id and . Example application:
#!/usr/bin/perl use FCGI; my $request = FCGI::Request(); while ($request->Accept() >= 0) { die if $ENV{'FCGI_APACHE_ROLE'} ne "AUTHENTICATOR"; die if $ENV{'FCGI_ROLE'} ne "AUTHORIZER"; die if !$ENV{'REMOTE_WD'}; die if !$ENV{'REMOTE_'}; print STDERR "This text is written to the web server error log.\n"; if ( ($ENV{'REMOTE_' } eq "foo" || $ENV{'REMOTE_'} eq "foo1") && $ENV{'REMOTE_WD'} eq "bar" ) { print "Status: 200\n"; print "Variable-AUTHN_1: authn_01\n"; print "Variable-AUTHN_2: authn_02\n"; print "\n"; } else { print "Status: 401\n\n"; } }Example configuration:
AuthnzFcgiDefineProvider authn FooAuthn fcgi://localhost:10102/ <Location "/protected/"> AuthType Basic AuthName "Restricted" AuthBasirovider FooAuthn Require ... </Location>
authz
, mechanism Require
FCGI_ROLE
is set to AUTHORIZER
and FCGI_APACHE_ROLE
is set to AUTHORIZER
. The application must be defined as provider type authz using AuthnzFcgiDefineProvider
. When invoked, the application is expected to authorize the client using the provided id and other request data. Example application:
#!/usr/bin/perl use FCGI; my $request = FCGI::Request(); while ($request->Accept() >= 0) { die if $ENV{'FCGI_APACHE_ROLE'} ne "AUTHORIZER"; die if $ENV{'FCGI_ROLE'} ne "AUTHORIZER"; die if $ENV{'REMOTE_WD'}; print STDERR "This text is written to the web server error log.\n"; if ($ENV{'REMOTE_'} eq "foo1") { print "Status: 200\n"; print "Variable-AUTHZ_1: authz_01\n"; print "Variable-AUTHZ_2: authz_02\n"; print "\n"; } else { print "Status: 403\n\n"; } }Example configuration:
AuthnzFcgiDefineProvider authz FooAuthz fcgi://localhost:10103/ <Location "/protected/"> AuthType ... AuthName ... AuthBasirovider ... Require FooAuthz </Location>
authnz
, mechanism AuthBasirovider
+ Require
AUTHORIZER
protocol, FCGI_ROLE
is set to AUTHORIZER
and FCGI_APACHE_ROLE
is not set. The application must be defined as provider type authnz using AuthnzFcgiDefineProvider
. The application is expected to handle both authentication and authorization in the same invocation using the id, , and other request data. The invocation occurs during the Apache httpd API authentication phase. If the application returns 200 and the same provider is invoked during the authorization phase (via Require
), mod_authnz_fcgi will return success for the authorization phase without invoking the application. Example application:
#!/usr/bin/perl use FCGI; my $request = FCGI::Request(); while ($request->Accept() >= 0) { die if $ENV{'FCGI_APACHE_ROLE'}; die if $ENV{'FCGI_ROLE'} ne "AUTHORIZER"; die if !$ENV{'REMOTE_WD'}; die if !$ENV{'REMOTE_'}; print STDERR "This text is written to the web server error log.\n"; if ( ($ENV{'REMOTE_' } eq "foo" || $ENV{'REMOTE_'} eq "foo1") && $ENV{'REMOTE_WD'} eq "bar" && $ENV{'REQUEST_URI'} =~ m%/bar/.*%) { print "Status: 200\n"; print "Variable-AUTHNZ_1: authnz_01\n"; print "Variable-AUTHNZ_2: authnz_02\n"; print "\n"; } else { print "Status: 401\n\n"; } }Example configuration:
AuthnzFcgiDefineProvider authnz FooAuthnz fcgi://localhost:10103/ <Location "/protected/"> AuthType Basic AuthName "Restricted" AuthBasirovider FooAuthnz Require FooAuthnz </Location>
authn
, mechanism check__id
FCGI_ROLE
is set to AUTHORIZER
and FCGI_APACHE_ROLE
is set to AUTHENTICATOR
. The application must be defined as provider type authn using AuthnzFcgiCheckAuthnProvider
specifies when it is called. Example application:
#!/usr/bin/perl use FCGI; my $request = FCGI::Request(); while ($request->Accept() >= 0) { die if $ENV{'FCGI_APACHE_ROLE'} ne "AUTHENTICATOR"; die if $ENV{'FCGI_ROLE'} ne "AUTHORIZER"; # This authorizer assumes that the RequireBasicAuth option of # AuthnzFcgiCheckAuthnProvider is On: die if !$ENV{'REMOTE_WD'}; die if !$ENV{'REMOTE_'}; print STDERR "This text is written to the web server error log.\n"; if ( ($ENV{'REMOTE_' } eq "foo" || $ENV{'REMOTE_'} eq "foo1") && $ENV{'REMOTE_WD'} eq "bar" ) { print "Status: 200\n"; print "Variable-AUTHNZ_1: authnz_01\n"; print "Variable-AUTHNZ_2: authnz_02\n"; print "\n"; } else { print "Status: 401\n\n"; # If a response body is written here, it will be returned to # the client. } }Example configuration:
AuthnzFcgiDefineProvider authn FooAuthn fcgi://localhost:10103/ <Location "/protected/"> AuthType ... AuthName ... AuthnzFcgiCheckAuthnProvider FooAuthn \ Authoritative On \ RequireBasicAuth Off \ Expr "%{reqenv:REMOTE_}" Require ... </Location>
AUTHENTICATOR
and AUTHORIZER
), define separate providers as follows, even if they map to the same application: AuthnzFcgiDefineProvider authn FooAuthn fcgi://localhost:10102/ AuthnzFcgiDefineProvider authz FooAuthz fcgi://localhost:10102/Specify the authn provider on
Require
: AuthType Basic AuthName "Restricted" AuthBasirovider FooAuthn Require FooAuthz
AUTHORIZER
role (authentication and authorizer in one invocation), define a single provider as follows: AuthnzFcgiDefineProvider authnz FooAuthnz fcgi://localhost:10103/Specify the authnz provider on both
AuthBasirovider
and Require
: AuthType Basic AuthName "Restricted" AuthBasirovider FooAuthnz Require FooAuthnz
The following are potential features which are not currently implemented:
FCGI_APACHE_ROLE
to ACCESS_CHECKER
.
fcgistarter
can be used to start them.
Proxy
used with FastCGI responders.
error
and higher.warn
.debug
.trace2
. The value of the REMOTE_WD
variable will be obscured, but any other sensitive data will be visible in the log.trace5
. All sensitive data will be visible in the log.LogLevel
can be used to configure a log level specific to mod_authnz_fcgi. For example:
LogLevel info authnz_fcgi:trace8
Description: | Enables a FastCGI application to handle the check_authn authentication hook. |
---|---|
Syntax: | AuthnzFcgiCheckAuthnProvider provider-name| |
Default: | none |
Context: | directory |
Status: | Extension |
Module: | mod_authnz_fcgi |
This directive is used to enable a FastCGI authorizer to handle a specific processing phase of authentication or authorization.
Some capabilities of FastCGI authorizers require enablement using this directive instead of AuthBasirovider
:
Expr
option below AuthnzFcgiDefineProvider
.
None
None
to disable a provider enabled with this directive in an outer scope, such as in a parent directory.
Expr
is configured and evaluates to an empty string (e.g., authorizer didn't return a variable), this value will be used as the id. This is typically used when the authorizer has a concept of guest, or unauthenticated, s and guest s are mapped to some specific id for logging and other purposes.
Variable-XXX
setting returned by the authorizer using an option like Expr "%{reqenv:XXX}"
. If this option is specified and the id can't be retrieved using the expression after a successful authentication, the request will be rejected with a 500 error.
Description: | Defines a FastCGI application as a provider for authentication and/or authorization |
---|---|
Syntax: | AuthnzFcgiDefineProvider type provider-name backend-address |
Default: | none |
Context: | server config |
Status: | Extension |
Module: | mod_authnz_fcgi |
This directive is used to define a FastCGI application as a provider for a particular phase of authentication or authorization.
Require
.
fcgistarter
.
Available Languages: fr