User, Session, Client resources
User, Session, Client resources and mechanics explained
User
Aidbox has a SCIM User Resource.
Attributes:
element | type | description |
---|---|---|
id | string | |
string | ||
password | string | Hash of password |
identifier | Identifier[] | |
userName |
Create Users
To create user you can use CRUD API, e.g. POST /User
and PUT /User/
User Login
Human User can use /auth/login to log in with credentials defined in a User resource
System can authenticate a User as it is specified in OAuth 2.0 spec. For example, you can get access token via
Note for such authentification a Client resource should be created
You can find different authorization flow examples in the Auth Sandbox in the Aidbox ui
GET /auth/userinfo
returns info about current User session
Activate/Deactivate Users
To control User active status you can change User.inactive
attribute by setting true or false value. Deactivating user doesn't affect Session's activation.
Sessions
For each user login Aidbox creates Session resource
Session expiration
Basically, all sessions stored in Aidbox are infinite, and you have to manage session expiration by yourself manually.
However since Aidbox v:2205 Session.exp
field was added. It represents NumericDate from RFC7519 and it identifies the expiration time after which the Session will not be accepted for processing.
You can specify auth.*.access_token_expiration
(in seconds) on Client resource, so Session.exp
field will be propagated once corresponding grant_type is used to launch a Session.
Session expiration for Aidbox UI
In Aidbox version v:2402 and later, sessions created through the Aidbox UI log-in are not infinite. The default session expiration time is set to 432000 seconds (5 days). To change the default time, create an AuthConfig
resource and set the asidCookieMaxAge
to the desired value:
Client
To provide programmatic access to Aidbox you have to register a Client
resource.
Client.audience
Client.audience
A Client
can have the audience
attribute. The audience
shows what resource server access is intended for. Aidbox compares the audience
of the Client
to the audience
it receives within aJWT
and decides if the access should be granted.
The audience
attribute can be defined in 2 ways:
As a plain string. For example,
https://cmpl.aidbox.app/smart
As a
Regex
. In that case, theaudience
value should start with the#
symbol. For example,#https://cmpl.aidbox.app/tenant/[^\]/smart
That validation of the audience
happens when SMART on FHIR app launches
Client.grant_types
Client.grant_types
Client
resource must have grant_types
attribute defining authentification scheme for this Client.
Application grant types (or flows) are methods through which applications can gain Access Tokens and by which you grant limited access to your resources to another entity without exposing credentials.
Grant types are choosed appropriately based on the grant_types
property of your Auth0-registered Application. The OAuth 2.0 protocol supports several types of grants, which allow different types of access. To see available grant types and grant type mapping refer to the doc.
Other required attributes are determined based on the values of this attribute grant_types
is an array of strings, possible values are:
basic
client_credentials
password
implicit
authorization_code
code
You can find different authorization flow examples in the Auth Sandbox in the Aidbox ui
Last updated