Apache::AuthCookieDBIRadius - An AuthCookie module backed by a DBI database, and an optional Radius server.
# In httpd.conf or .htaccess ############################################ # AuthCookie # # # # PortalDBI_CryptType # # PortalDBI_GroupsTable # # PortalDBI_GroupField # # PortalDBI_GroupUserField # # PortalDBI_EncryptionType none|crypt|md5 # # PortalDBI_a on|off # # PortalDBI_b on|off # # PortalDBI_c on|off # # PortalDBI_d on|off # # PortalDBI_e on|off # # PortalDBI_f on|off # # PortalDBI_g on|off # # PortalDBI_useracct on|off # # PortalDBI_log_field last_access # # PortalDBI_Radius_host none # # PortalDBI_Radius_port 1645 # # PortalDBI_Radius_secret none # # PortalDBI_Radius_timeout 45 # # AuthCookieDebug 0,1,2,3 # # PortalDomain .yourdomain.com # # # ############################################ # key line must come first PerlSetVar PortalDBI_SecretKeyFile /usr/local/apache/conf/site.key PerlModule Apache::AuthCookieDBIRadius PerlSetVar PortalPath / PerlSetVar PortalLoginScript /login.pl PerlSetVar AuthCookieDebug 1 PerlSetVar PortalDBI_DSN 'dbi:Pg:host=localhost port=5432 dbname=mydatabase' PerlSetVar PortalDBI_User "database_user" PerlSetVar PortalDBI_Password "database_password" PerlSetVar PortalDBI_UsersTable "users" PerlSetVar PortalDBI_UserField "userid" PerlSetVar PortalDBI_PasswordField "password" PerlSetVar PortalDBI_SessionLifeTime 00-24-00-00 <FilesMatch "\.pl"> AuthType Apache::AuthCookieDBIRadius AuthName Portal SetHandler perl-script PerlHandler Apache::Registry Options +ExecCGI </FilesMatch> # login.pl <Files LOGIN> AuthType Apache::AuthCookieDBIRadius AuthName Portal SetHandler perl-script PerlHandler Apache::AuthCookieDBIRadius->login </Files> ####################################### # # # Begin websites # # # ####################################### # private <Directory /home/httpd/html/private> AuthType Apache::AuthCookieDBIRadius AuthName Portal PerlSetVar PortalDBI_b on PerlAuthenHandler Apache::AuthCookieDBIRadius->authenticate PerlAuthzHandler Apache::AuthCookieDBIRadius->authorize require valid-user </Directory> # calendar <Directory /home/httpd/html/calendar> AuthType Apache::AuthCookieDBIRadius AuthName Portal PerlSetVar PortalDBI_a on PerlAuthenHandler Apache::AuthCookieDBIRadius->authenticate PerlAuthzHandler Apache::AuthCookieDBIRadius->authorize require valid-user </Directory>
This module is an authentication handler that uses the basic mechanism provided by Apache::AuthCookie with a DBI database for ticket-based protection. It is based on two tokens being provided, a username and password, which can be any strings (there are no illegal characters for either). The username is used to set the remote user as if Basic Authentication was used.
On an attempt to access a protected location without a valid cookie being provided, the module prints an HTML login form (produced by a CGI or any other handler; this can be a static file if you want to always send people to the same entry page when they log in). This login form has fields for username and password. On submitting it, the username and password are looked up in the DBI database. The supplied password is checked against the password in the database; the password in the database can be plaintext, or a crypt() or md5_hex() checksum of the password. If this succeeds, the user is issued a ticket. This ticket contains the username, an issue time, an expire time, and an MD5 checksum of those and a secret key for the server. It can optionally be encrypted before returning it to the client in the cookie; encryption is only useful for preventing the client from seeing the expire time. If you wish to protect passwords in transport, use an SSL-encrypted connection. The ticket is given in a cookie that the browser stores.
After a login the user is redirected to the location they originally wished to view (or to a fixed page if the login "script" was really a static file).
On this access and any subsequent attempt to access a protected document, the browser returns the ticket to the server. The server unencrypts it if encrypted tickets are enabled, then extracts the username, issue time, expire time and checksum. A new checksum is calculated of the username, issue time, expire time and the secret key again; if it agrees with the checksum that the client supplied, we know that the data has not been tampered with. We next check that the expire time has not passed. If not, the ticket is still good, so we set the username.
Authorization checks then check that any "require valid-user" or "require user jacob" settings are passed. Finally, if a "require group foo" directive was given, the module will look up the username in a groups database and check that the user is a member of one of the groups listed. If all these checks pass, the document requested is displayed.
If a ticket has expired or is otherwise invalid it is cleared in the browser and the login form is shown again.
All configuration directives for this module are passed in PerlSetVars. These PerlSetVars must begin with the AuthName that you are describing, so if your AuthName is PrivateBankingSystem they will look like:
PerlSetVar PrivateBankingSystemDBI_DSN "DBI:mysql:database=banking"
See also Apache::Authcookie for the directives required for any kind of Apache::AuthCookie-based authentication system.
In the following descriptions, replace "WhatEver" with your particular AuthName. The available configuration directives are as follows:
WhatEverDBI_DSN
Specifies the DSN for DBI for the database you wish to connect to retrieve user information. This is required and has no default value.
WhatEverDBI_User
The user to log into the database as. This is not required and defaults to undef.
WhatEverDBI_Password
The password to use to access the database. This is not required and defaults to undef.
WhatEverDBI_UsersTable
The table that user names and passwords are stored in. This is not required and defaults to 'users'.
WhatEverDBI_UserField
The field in the above table that has the user name. This is not required and defaults to 'user'.
WhatEverDBI_PasswordField
The field in the above table that has the password. This is not required and defaults to 'password'.
WhatEverDBI_CryptType
What kind of hashing is used on the password field in the database. This can be 'none', 'crypt', or 'md5'. This is not required and defaults to 'none'.
WhatEverDBI_GroupsTable
The table that has the user / group information. This is not required and defaults to 'groups'.
WhatEverDBI_GroupField
The field in the above table that has the group name. This is not required and defaults to 'grp' (to prevent conflicts with the SQL reserved word 'group').
WhatEverDBI_GroupUserField
WhatEverDBI_SecretKeyFile
The file that contains the secret key (on the first line of the file). This is required and has no default value. This key should be owned and only readable by root. It is read at server startup time. The key should be long and fairly random. If you want, you can change it and restart the server, (maybe daily), which will invalidate all prior-issued tickets.
WhatEverDBI_EncryptionType
What kind of encryption to use to prevent the user from looking at the fields in the ticket we give them. This is almost completely useless, so don't switch it on unless you really know you need it. It does not provide any protection of the password in transport; use SSL for that. It can be 'none', 'des', 'idea', 'blowfish', or 'blowfish_pp'.
This is not required and defaults to 'none'.
WhatEverDBI_SessionLifetime
How long tickets are good for after being issued. Note that presently Apache::AuthCookie does not set a client-side expire time, which means that most clients will only keep the cookie until the user quits the browser. However, if you wish to force people to log in again sooner than that, set this value. This can be 'forever' or a life time specified as:
DD-hh-mm-ss -- Days, hours, minute and seconds to live.
This is not required and defaults to '00-24-00-00' or 24 hours.
For this module to work, the database tables must be laid out at least somewhat according to the following rules: the user field must be a primary key so there is only one row per user; the password field must be NOT NULL. If you're using MD5 passwords the password field must be 32 characters long to allow enough space for the output of md5_hex(). If you're using crypt() passwords you need to allow 13 characters.
An minimal CREATE TABLE statement might look like:
CREATE TABLE users ( user VARCHAR(16) PRIMARY KEY, password VARCHAR(32) NOT NULL )
For the groups table, the access table is actually going to be a join table between the users table and a table in which there is one row per group if you have more per-group data to store; if all you care about is group membership though, you only need this one table. The only constraints on this table are that the user and group fields be NOT NULL.
A minimal CREATE TABLE statement might look like:
CREATE TABLE groups ( grp VARCHAR(16) NOT NULL, user VARCHAR(16) NOT NULL )
Copyright (C) 2000 SF Interactive, Inc. All rights reserved.
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
ERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Author: Charles Day <BarracodE@s1te.com> Original Author: Jacob Davies <jacob@sfinteractive.com> <jacob@well.com>
Apache::AuthCookie(1) Apache::AuthCookieDBI(1)
To install Apache::AuthCookieDBIRadius, copy and paste the appropriate command in to your terminal.
cpanm
cpanm Apache::AuthCookieDBIRadius
CPAN shell
perl -MCPAN -e shell install Apache::AuthCookieDBIRadius
For more information on module installation, please visit the detailed CPAN module installation guide.