Kong Gateway Oauth2

By on March 8, 2021

4 Steps to Authorizing Services With the Kong Gateway OAuth2 Plugin

In this tutorial, I’m going to walk through adding OAuth2 authorization and authentication to your service with the Kong Gateway OAuth2 plugin. First, I’ll cover the fundamentals. If you’re already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial.

 

Interconnected. Shared. That’s the norm for today’s applications, networks and data. Regardless of your space — social, financial, medical, local, global — your users expect seamless connectivity and access to their data across services. The way to provide smooth and secure authorization for sharing resources  is with OAuth 2.0.

Authentication vs. Authorization

Authentication is the verification that a user is who they say they are.

Authorization determines what resources a user is allowed to access. 

For example, a user might authenticate as Cassandra Thomas by logging in with a username and password. She is authorized to access the “add new payment” functionality for her account.

What Is Kong Gateway?

Kong Gateway is an open source, lightweight API gateway that sits in front of your upstream services. You might run an API server but need to manage traffic, API gateway authentication or logging as requests reach your server. Kong Gateway, with all of its available plugins, serves as that front line.

What Is OAuth2 Authorization?

OAuth2 is an authorization protocol that enables two unrelated services to share resources. 

Here’s an example that explains the fundamental concepts of OAuth:
Meet Clark. Clark got a shiny, new pedometer for his birthday, and he has an account with Step On (stepon.me) to track his daily step count. Step On stores some information for Clark — his user profile, biometric data and daily step count.

 

Kong Gateway oAuth2 example


In OAuth terminology, Clark is the
resource owner, and his resources (user profile, biometric data and daily step count) are held by Step On, the resource server.

Clark also has an account with Shoe Fly Shoe (shoeflyshoe.store), an online store that gives discounts when customers hit certain step counts. If any customers have an account with Step On, the store can connect to the customer’s Step On accounts to download those step counts automatically. Super convenient!

Shoe Fly Shoe is the client application, needing access to Clark’s resources at the resource server. For this to happen, Clark needs to let Step On know that he authorizes the store to access those resources.

The OAuth protocol negotiates this process. It starts when a resource owner authorizes a client application to access resources on the resources server. Upon authorization, the client application gets an authorization code and exchanges it for an access token and a refresh token. When the client application presents the access token to the authorization server, it essentially says, “Hey, remember me? I’m that application that Clark said would be allowed to access his stuff. Let me in, please.” After some time, the access token will expire. The client application presents the refresh token to the authorization server to request a new access token.

What Does the Kong Gateway OAuth2 Plugin Do?

As Kong Gateway sits in front of a resource server, the OAuth2 plugin adds authorization server functionality to that resource server — handling authorization requests, inspecting and refreshing tokens, and permitting or forbidding access to resources.

Example: Adding Kong Gateway OAuth2 to Your API Server

Now that you understand the fundamentals, you should be able to build an example project:

  1. Set up an express API service and endpoint by building a Node.js Express server as the API Server for Step On. There will be only one API endpoint, which returns a JSON with dates and step counts for a user.
  2. Put your API server behind Kong Gateway.
  3. Enable the OAuth2 plugin for Kong Gateway. In my example, I’ll register Shoe Fly Shoe as a client application — a plugin consumer — that would like its users to connect to their accounts with Step On.
  4. Walk through OAuth2 flow of requests — HTTPS requests that demonstrate the OAuth process in action.

Ready to go? Buckle up!

1. Set Up an Express API Server and Endpoint

In your terminal, create a project folder and initialize a new Node.js project. I’ll use yarn as my package manager, but you could use npm too:

Add the packages you’ll need:

HTTPS on localhost

Because of OAuth specification requirements and the plugin’s recommendations, it will be smoother to serve up your API server with HTTPS. The simplest way to do this is to generate a self-signed certificate for https://localhost. Then, tell your API Client to disable certificate verification. Self-signed certificates are typically bad news, but you can trust yourself since you’re just doing local development.

To do this, create a sub-folder and generate a certificate and key:

With this certificate and key, you can spin up your Express server with HTTPS.

Mock Step Count Data

Your single GET /stepcounts endpoint will need to retrieve daily step counts for a given user. Mock up some JSON data in project/data.json:

GET Step Count Endpoint

Back in the project folder, we create your index.js file, which will implement your endpoint and spin up your server:

Here’s what the above code means:

    1. First, gather the SSL key and certificate needed to spin up the server with HTTPS. Initialize the Express application, and read in your mock data.
    2. getCurrentUser mocks your server’s “authentication” functionality. Set a header mock-logged-in-as to mock being logged in as a specific user (like clark, for example). There is also a x-authenticated-userid header that could indicate the user for which the request is being made. (This is related to the OAuth plugin, which I’ll explain later in this article.) 
    3. Create a GET endpoint at /stepcounts.
    4. In this endpoint, if there is no “logged in” user, send back a 401. If there is a user, then send a response with that user’s step count data.
    5. Lastly, start your server, using https on port 3000.

Finally, start up your API server:

Test HTTPS Requests

To test my requests, I’ll use Insomnia.

After installing and starting, go to Preferences and uncheck the box labeled “Validate certificates.” I’m using a self-signed SSL certificate for local development.

Insomnia disable validate certificates

Once your API server is running, send a request to the /stepcounts endpoint, without any logged-in user:

Insomnia 3000 no logged in user for Kong Gateway Oauth2

As expected, 401 Unauthorized. That’s because getCurrentUser() didn’t find a user.

Next, add a header mock-logged-in-as, setting the value to clark:

Insomnia 3000 Clark

Great! Now you should see Clark’s step count data. Remember: this step count data is Clark’s resource, and only he (or any client he authorizes) should be allowed to access it.

2. Put Your API Server Behind Kong Gateway

Next, set up Kong Gateway to sit in front of your API server. The installation steps for Kong will depend on your local environment.

Database, Configuration and Start Up

The Kong Gateway OAuth2 plugin requires a database to store settings, authorization codes and tokens. The simplest setup is to have PostgreSQL running on your local machine. While logged into your PostgreSQL server, create a user and database for Kong:

After installing Kong Gateway, you’ll have a few configurations left to set. First, go to /etc/kong. There, you will find a kong.conf.default template file. Copy it and rename it as kong.conf, and then edit (you’ll need root privileges) as follows:

Lastly, set up the newly created database and start up Kong (as root):

Add Service and Route to Kong

Configure the API gateway by making requests to Kong’s admin REST API, accessible at https://localhost:8001. First, add your API server to Kong as an upstream API service. Send a POST request to /services with a JSON body as follows:

Insomnia 8001 Add Service for Kong Gateway Oauth2

Next, create a route, telling Kong to listen on the /stepon path, routing those requests to your service at https://localhost:3000. Your POST request to the admin API’s /routes should look like this:

Insomnia 8001 Add Route

Test Endpoint Through Kong Gateway

With your service and route set up, test by sending a GET request to https://localhost:8000/stepon/stepcounts. Make sure to add your mock-logged-in-as header with clark (or annie or bob) ) as the value:

Insomnia 8000 Get Clark for Kong Gateway Oauth2

It works! You should now be sending your requests through Kong Gateway at port 8000. As you request the path /stepon, Kong Gateway routes that to your API Server at port 3000. Of course, in a production environment, you would lock down your API Server to be accessible only via routing from the Kong Gateway.

3. Enable the Kong Gateway OAuth 2 Plugin

Next, add the OAuth2 plugin. Send a POST request to the admin API at /services/step-on-api-server/plugins. You can see the RESTful API route here, as this plugins path is underneath your specific service:

Insomnia 8001 Add Plugin

In this API request body, you’ll note the configuration value called scopes, which you have set to an array of three strings: user_profile, biometric and step_counts. Step On may allow many different client applications to connect through OAuth, and various applications may ask for authorization to access different resources. Scopes in OAuth2 enable the resource server to limit what resources a client application is authorized to access. Shoe Fly Shoe should only need to access step counts, whereas a different application might request authorization for step counts and biometric data. Scopes give more granular control to authorization.

Now that you have set up OAuth authorization, try to get Clark’s step counts again with the GET request you just used:

Insomnia 8000 No Token for Kong Gateway Oauth2

The access token is missing.” With the Kong Gateway OAuth2 plugin enabled, Kong Gateway rejected my request because I didn’t provide an OAuth access token. This is exactly the behavior you should expect. All requests now need to pass through the OAuth authorization server. No token? No entry.

Add Client Application (API Consumer) to the Plugin

In my example, the developers at Shoe Fly Shoe would submit their application to Step On for connection approval: “I want my users to connect me to their accounts with Step On, so that I can access their daily step counts. I noticed you support OAuth2. Can you grant me a client ID and secret so that I can ask users to authorize us to access resources at your API server?

Assuming Step On approves this request, it would then add this new client to the plugin. In Kong, this means creating a consumer and provisioning OAuth credentials. Send a POST request to /consumers to add the store to Kong as a consumer:

Insomnia 8001 Add Consumer

Next, add OAuth credentials for the store, which it will use when requesting authorization or tokens. Send a POST request to /consumers/shoeflyshoe/oauth2:

Insomnia 8001 Add Credential for Kong Gateway Oauth2

Here, you should provide a name for your client application: Shoe Fly Shoe Customer Rewards. The important data you get back is the client_id and the client_secret. You might notice that your request body also included redirect_uris. This is a good time to explain the OAuth2 authorization flow.

The OAuth2 Authorization Flow

Imagine Clark is logged into the store. He sees that he can connect his Step On account to download his step counts. Awesome! Clark clicks on the button to connect his account.

The store redirects Clark to the authorization request page on Step On’s website. Shoe Fly Shoe includes the following data:

  • Shoe Fly Shoe’s client_id so that Step On knows which client application is asking Clark for authorization
  • Shoe Fly Shoe’s requested scopes so that Clark knows what kinds of resources the store would like to access
  • A redirect_uri so that Step On knows where to redirect Clark after this authorization process completes

The authorization page would look something like this:

authorize window

Photo by Arek Adeoye on Unsplash


This assumes Clark is logged in at Step On. If not, Step On would ask him to log in first and then redirect him to this authorization page.

When Clark clicks on “Authorize,” the Step On web server sends a behind-the-scenes POST request to a specific OAuth authorization endpoint for Step On, which generates an authorization code. Then, the webserver redirects Clark to the redirect_uri with this authorization code tacked on as a query param.

In your credential configuration, you should set a redirect_uri to be a specific address on the store’s website, which it will use to capture the authorization code in order to exchange it for an access token.

4. Walk Through OAuth2 Flow of Requests

Now that your API server, gateway, plugin and consumer are all set up, I’ll walk through all of the HTTP requests that make up the authorization flow.

User Submits POST Request to Authorize Application

The moment Clark clicks the “Authorize” button, the webserver handling the form sends a behind-the-scenes POST request to https://localhost:8000/stepon/oauth2/authorize on your API server. If you don’t remember me implementing that endpoint for my Express server, it’s because I didn’t. The OAuth2 plugin takes care of that for us, building the authorization server on top of your API server. Here’s what the request looks like:

Insomnia 8000 get code for Kong Gateway Oauth2

The provision_key is a unique identifier for the Kong Gateway OAuth2 plugin enabled on your API Server. This information, along with the authenticated_userid— that’s Clark’s username on the Step On site — is not information that the store would be privy to when requesting authorization. Step On’s web server needs to provide this information, tacking it on as it requests an authorization code.

The response that comes back is a redirect_uri, which is the address provided by the store, with an authorization code appended to the end. The web server redirects Clark’s web browser back to the store’s website.

Client Application Exchanges Code for Access Token

Clark’s web browser brings him to a page that the store has set up to process successful authorization requests. The store’s web server takes the authorization code, and it sends a behind-the-scenes POST request to the authorization server’s /oauth2/token endpoint at Step On, asking for an access token. The request from the store looks like this:

Insomnia 8000 get token

Shoe Fly Shoe includes its client_id and its client_secret, along with the authorization code it just captured. The authorization server response includes an access_token, which expires in two hours, and a refresh_token. The store saves these tokens to its database, associating them with its account for Clark and his association with Step On.

Client Application Uses Access Token to Request Resource

Finally, with access_token in hand, the store can request the resource server. Start with your original GET request to https://localhost:8000/stepon/stepcounts. Then, add your Authorization header. In Insomnia, set up “Bearer Token Auth” for your request and paste in the access_token received from the previous request:

Insomnia 800 with token for Kong Gateway Oauth2

The response is a 200 OK. The access_token that the store presented with its request gave it access to Clark’s resources on the Step On API Server. Here’s what just happened:

Kong Gateway received this request routed for the Step On API Server. The Kong Gateway OAuth2 plugin protects that service. The plugin looks for a Bearer Auth token, and it finds one. The plugin checks the database of valid tokens and finds that this token belongs to the store, authorizing it to access resources for the user clark, scoped to step_counts resources only.

As Kong routes the request on to the API Server, it writes this token-related information to the upstream headers. Here’s what the headers in your console log should look like:

Upstream headers

You should see the consumer username as shoeflyshoe— that’s how you know who is requesting this resource. You should also see the x-authenticated-userid as clark. This is the resource owner. In my endpoint, I wrote a getCurrentUser() function to look for this x-authenticated-userid header so that I would know whose step count data I should be looking up.

Lastly, you should see x-authenticated-scope as step_counts. Recall that Clark’s authorization for Shoe Fly Shoe was limited in scope to step_counts only. While Kong will let a request with a valid access_token through to your API server, it’s your API server’s responsibility to enforce scopes. For example, this token might get us through the gateway to a biometric data endpoint, but the API server would see x-authenticated-scope doesn’t include biometric and would reject the request.

Requesting a Refreshed Access Token

In case an access_token is about to expire, the store can issue a refresh token request:

Insomnia 8000 refresh token for Kong Gateway Oauth2

This request is quite similar to the one that exchanged an authorization code for an access token, except that now a refresh_token is used to obtain a new access_token and refresh_token. Note that this request invalidates the original access_token and refresh_token.

Additional Use Cases

Before I wrap up, I’ll touch upon two additional use cases.

“Anonymous” Access on Authorization Fail

By default, the Kong plugin responds to failed authentication with a 401 Unauthorized. You can, however, configure it to allow requests onto the service, setting the upstream header to note that this is an “anonymous” user. There might be a case where an authenticated user would have full access to resources, while an “anonymous” user might have limited access, but access nonetheless.

OAuth2 Introspection With a Third-Party Authorization Server

In my example, I used the Kong Gateway OAuth2 plugin to extend my API server to act also as the authorization server. Kong added the /oauth2/* endpoints to my service’s routes, and my database holds onto tokens and authorization codes.

OAuth2 Introspection involves authorization and validation of tokens at a third-party authorization server, delegating responsibility to that trusted third party. Kong provides the OAuth2 Introspection plugin to handle this. Authorization requests and token presentations to your Kong Gateway are sent to that authorization server for introspection, and that server sends a response so that Kong knows how to proceed.

Service Authorization Complete

You’ve just journeyed through a hands-on, practical deep dive building an API server protected by Kong Gateway and OAuth2. Hopefully, you acquired a deeper understanding of the OAuth2 framework and gained experience in using tools like the plugin for quick setup of secure authorization.

OAuth2, now the widely accepted standard for authorization protocols, provides a secure and seamless way for unrelated services to share authorized resources. It does this while facilitating a nearly transparent user experience. In today’s tech world, services belonging to different organizations or industries expect to talk to one another and share resources, securely and expediently. OAuth2 provides just that, and the Kong Gateway OAuth2 plugin makes implementation smooth and quick.

You have what you need now. It’s time to get up and running. 👟

 

Have questions or want to stay in touch with the Kong community? Join us wherever you hang out:

⭐ Star us on GitHub

🐦 Follow us on Twitter

🌎 Join the Kong Community

🍻 Join our Meetups

❓ ️Ask and answer questions on Kong Nation

💯 Apply to become a Kong Champion

 

Tags: