Last active
July 12, 2024 06:18
-
-
Save shashanthk/a21670592b16afedd0626bf239a3c2eb to your computer and use it in GitHub Desktop.
Pentaho server auth without exposing username and password via Nginx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
upstream pentaho-server { | |
server <PENTAHO_SERVER_IP>:<PENTAHO_PORT>; | |
} | |
server { | |
## default listen port | |
listen 80; | |
## domain name | |
server_name pentaho.example.com; | |
access_log /var/log/nginx/pentaho-access.log; | |
error_log /var/log/nginx/pentaho-error.log; | |
## | |
## MAKE SURE TO ADD NECESSARY SECURITY HEADERS HERE | |
## | |
location / { | |
set $temp_args $args; | |
if ($args ~* "partkey=") { | |
rewrite ^ /validate$uri last; | |
} | |
proxy_set_header X-Forwarded-Host $host; | |
proxy_set_header X-Forwarded-Server $host; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
## add required additional headers per your requirements | |
proxy_pass http://pentaho-server; | |
} | |
location /validate { | |
internal; | |
set $token ""; | |
if ($args ~* "partkey=") { | |
set $token $arg_partkey; | |
set $args "${temp_args}&userid=<PENTAHO_USERNAME>&password=<PENTAHO_PASSWORD>"; | |
} | |
rewrite ^/validate(?<realurl>/.*)$ $realurl break; | |
auth_request /auth; | |
proxy_set_header X-Forwarded-Host $host; | |
proxy_set_header X-Forwarded-Server $host; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_pass http://pentaho-server; | |
} | |
location /auth { | |
internal; | |
proxy_set_header token $token; | |
proxy_pass http://<SERVER_IP>:<PORT>/service/that/validates/pentaho-token; | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Above configuration is to add one layer of security to avoid exposing the username and password of Pentaho report link. Below is an example:
Above URL contains user credential in plain format. If we do not want to expose it to the public, the Nginx config is the one ugly hack we can follow.
We need to write 2 REST APIs using any programming language or framework that does the below works:
When we open Pentaho links the links should be in the below format: