= Introduction
GlobalSession enables multiple heterogeneous Web applications to share
session state in a cryptographically secure way, facilitating single sign-on
and enabling easier development of distributed applications that
make use of architectural strategies such as sharding or separation of concerns.
In other words: it glues your semi-related Web apps together so they share the
same bits of session state. This is done by putting the session itself into
cookies.
Maintained by
- [Sapphire Team](https://wookiee.rightscale.com/display/rightscale/Meet+the+Sapphire+Team)
Merge to master whitelist
- @tony-spataro-rs
- @ryanwilliamson
== What Is It Not?
This plugin does not provide a complete solution for identity management. In
particular, it does not provide any of the following:
* federation -- aka cross-domain single sign-on -- use OpenID for that.
* authentication -- the application must authenticate the user.
* authorization -- the application is responsible for using the contents
of the global session to make authorization decisions.
* secrecy -- global session attributes can be signed but never encrypted;
protect against third-party snooping using SSL. Group secrecy is expensive;
if you don't want your users to see their session state, put it in a database,
or in an encrypted local session cookie.
* replication -- the authentication authorities must have some way to
share information about the database of users in order to authenticate
them and place identifying information into the global session.
* single sign-out -- the authorities must have some way to broadcast a
notification when sessions are invalidated; they can override the default
Directory implementation to do realtime revocation checking.
= Example
1) Create a basic config file and edit it to suit your needs:
$ script/generate global_session_config mycoolapp.com
2) Create an authentication authority:
$ script/generate global_session_authority mycoolapp
3) Declare that some or all of your controllers will use the global session:
class ApplicationController < ActionController::Base
has_global_session
end
4) Make use of the global session hash in your controllers:
global_session['user'] = @user.id
...
@current_user = User.find(global_session['user'])
= Global Session Contents
Global session state is stored as a cookie in the user's browser. The cookie
is a Zlib-compressed JSON dictionary containing the following stuff:
* session metadata (UUID, created-at, expires-at, signing-authority)
* signed session attributes (e.g. the authenticated user ID)
* insecure session attributes (e.g. the last-visited URL)
* a cryptographic signature of the metadata and signed attributes
The global session is unserialized and its signature is verified whenever
a controller asks for one of its attributes. The cookie's value is updated
whenever attributes change. As an optimization, the signature is only
recomputed when the metadata or signed attributes have changed; insecure
attributes can change "for free."
Because the security properties of attributes can vary, GlobalSession
requires all _possible_ attributes to be declared up-front in the config
file. The 'attributes' section of the config file defines the _schema_
for the global session: which attributes can be used, which can be trusted
to make authorization decisions (because they are signed), and are insecure
and therefore act only as "hints" about the session.
Since the session is serialized as JSON, only a limited range of object
types can be stored in it: strings, numbers, lists, hashes and other Ruby
primitives. Ruby booleans (true/false) do not translate well into JSON
and should be avoided.
= Detailed Information
== Global Session Domain
We refer to collection of _all_ Web application instances capable of using the
global session as the "domain." The global session domain may consist of any
number of distinct nodes, possibly hidden behind load balancers or proxies.
The nodes within the domain may all be running the same Rails application,
or they may be running different codebases that represent different parts of
a distributed application. (They may also be using app frameworks other than
Rails.)
The only constraint imposed by GlobalSession is that all nodes within the
domain must have end-user-facing URLs within the same second-level DNS domain.
This is due to limitations imposed by the HTTP cookie mechanism: for privacy
reasons, cookies will only be sent to nodes within the same domain as the
node that first created them.
For example, in my GlobalSession configuration file I might specify that my
cookie's domain is "example.com". My app nodes at app1.example.com and
app2.example.com would be part of the global session domain, but my business
partner's application at app3.partner.com could not participate.
== Authorities and Relying Parties
A node that can create or update the global session is said to be an "authority"
(because it's trusted by other parties to make assertions about global session
state). An application that can read the global session is said to be a "relying
party." In practice, every application is a relying party, but not all of them
need to be authorities.
There is an RSA key pair associated with each authority. The authority's
public key is distribued to all relying parties, but the private key must
remain a secret to that authority (which may consist of many individual
nodes).
This system allows for significant flexibility when configuring a distributed
app's global session. There must be at least one authority, but for many apps
one authority (plus an arbitrary number of relying parties, which do not need
a key pair) will be sufficient.
In general, two systems should be part of the same authority if there is no
trust boundary between them -- that is to say, trust between the two systems
is unlimited in both directions.
Here are some reasons you might consider dividing your systems into different
authorities:
* beta/staging system vs. production system
* system hosted by a third party vs. system hosted internally
* e-commerce node vs. storefront node vs. admin node
== The Directory
The Directory is a Ruby object instantiated by GlobalSession in order to
perform lookups of public and private keys. Given an authority name (as found
in a session cookie), the Directory can find the corresponding public key.
If the local system is an authority itself, #local_authority_name will
return non-nil and #private_key will return a private key suitable for
signing session attributes.
The Directory implementation included with GlobalSession uses the filesystem
as the backing store for its key pairs. Its #initialize method accepts a
filesystem path that will be searched for files containing PEM-encoded public
and private keys (the same format used by OpenSSH). This simple Directory
implementation relies on the following conventions:
* Public keys have a *.pub extension.
* Private keys have a *.key extension.
* If a node is an authority, then one (and *only* one) *.key file should exist.
* The local node's authority name is inferred from the name of the private key
file.
When used with a Rails app, GlobalSession expects to find its keystore in
config/authorities. You can use the global_session generator to create new key
pairs. Remember never to check a *.key file into a public repository!! (*.pub
files can be checked into source control and distributed freely.)
If you wish all of the systems to stop trusting an authority, simply delete
its public key from config/authorities and re-deploy your app.
=== Implementing Your Own Directory Provider
To replace or enhance the built-in Directory, simply create a new class that
extends Directory and put the class somewhere in your app (the lib directory
is a good choice). In the GlobalSession configuration file, specify the
class name of the directory under the 'common' section, like so:
common:
directory: MyCoolDirectory
Copyright (c) 2010 Tony Spataro , released under the MIT license