D
david.karr
I'm trying to understand some details under the covers of basic auth
and the use of JSESSIONID in webapp security.
On an initial request, I can send an HTTP request with an
Authorization header containing the basic auth encoded value. The
server sends back a response along with the JSESSIONID cookie.
Now that I have the JSESSIONID cookie on the client side, is it
possible to form a (successful) secondary request that does not have
the Authorization header, using the JSESSIONID value?
Secondly, is it possible for that secondary request to come from a
different IP than the initial request?
I doubt this can work like this, but I'm envisioning a collaboration
between the client and server portion of a webapp where the server
portion sends an HTTP request to a third-party server, sending the
Authorization header, which gets back a JSESSIONID value. This value
is rendered to the browser and used in subsequent requests from
Javascript.
If this can work, it allows the Javascript to be rendered with just a
transient session id, instead of the basic auth credentials.
I could specify the implementation of a web proxy on the server side
of the "client" webapp, but that wouldn't be as efficient or scalable.
and the use of JSESSIONID in webapp security.
On an initial request, I can send an HTTP request with an
Authorization header containing the basic auth encoded value. The
server sends back a response along with the JSESSIONID cookie.
Now that I have the JSESSIONID cookie on the client side, is it
possible to form a (successful) secondary request that does not have
the Authorization header, using the JSESSIONID value?
Secondly, is it possible for that secondary request to come from a
different IP than the initial request?
I doubt this can work like this, but I'm envisioning a collaboration
between the client and server portion of a webapp where the server
portion sends an HTTP request to a third-party server, sending the
Authorization header, which gets back a JSESSIONID value. This value
is rendered to the browser and used in subsequent requests from
Javascript.
If this can work, it allows the Javascript to be rendered with just a
transient session id, instead of the basic auth credentials.
I could specify the implementation of a web proxy on the server side
of the "client" webapp, but that wouldn't be as efficient or scalable.