Single Page Apps are ruling the world and AngularJS is leading the charge. But many of the lessons we learned in the Web 2.0 era no longer apply, and few are as drastically different as authentication.
CORS is an oft-misunderstood feature of new browsers that is configured by a remote server. CORS stands for Cross-Origin-Resource-Sharing, and was designed to make it possible to access services outside of the current origin (or domain) of the current page.
Like many browser features, CORS works because we all agree that it works. So all major browsers like Chrome, Firefox, and IE support and enforce it. By using these browsers, you benefit from the security of CORS.
That means certain browsers do not enforce it, so it is not relevant there. One large example is a native Web View for things like Cordova and Phonegap. However, these tools often have configuration options for whitelisting domains so you can add some security that way.
The way CORS works is the server decides which domains it will accept as clients. This means an open API like Twitter might allow any clients, or a closed API might decide to only allow access from the domain of the running client app.
I won't get into the details of configuring CORS on the server side, but it's really just setting some headers. Here's how you might do it in nginx.
There is one header in particular you must have if you want to do session based authentication in a single page app: Access-Control-Allow-Credentials: true
which we show next.
If you use the standard $http
service to access remote APIs, it will Just Work as long as the server is configured to allow requests from your domain.
But for many applications, we also need to set and store cookie information for things like logins. By default this is not allowed in most browsers and you'll be smashing your head wondering why the cookie information isn't being saved!
Enter: withCredentials
. withCredentials
is a flag set on a low-level XMLHttpRequest
(AJAX) object, but in Angular we can configure our $http
requests to set this flag for everything by doing:
angular.module('myApp')
.config(['$httpProvider', function($httpProvider) {
$httpProvider.defaults.withCredentials = true;
}])
As for CSRF, we can tell $http
to set the correct header for CSRF (might depend on your server framework, this one is for Django) using the specific cookie name:
angular.module('myApp', ['ngCookies'])
.run(['$http', '$cookies', function($http, $cookies) {
$http.defaults.headers.post['X-CSRFToken'] = $cookies.csrftoken;
}]);
One thing to note when using withCredentials: true
in your app and configuring the server for CORS is that you may not have your Access-Control-Allow-Origin
header set to '*'
. It must be configured to a few select origins. If you absolutely must have this set to *
, then I suggest doing something beyond cookie based authentication, such as token-based authentication.
Good for you the author! A lot of good!!! I fuck for the fourth day with authorization. And then all is solved in two lines.