Skip to content

middleware for Node.js implementing client SSL certificate authentication/authorization

Notifications You must be signed in to change notification settings

Algoteers/client-certificate-auth

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

client-certificate-auth

middleware for Node.js implementing client SSL certificate authentication/authorization

Copyright © 2013 Tony Gies

April 30, 2013

Build Status

installing

client-certificate-auth is available from npm.

$ npm install client-certificate-auth

requirements

client-certificate-auth is tested against Node.js versions 0.6, 0.8, and 0.10. It has no external dependencies (other than any middleware framework with which you may wish to use it); however, to run the tests, you will need mocha and should.

synopsis

client-certificate-auth provides HTTP middleware for Node.js (in particular Connect/Express) to require that a valid, verifiable client SSL certificate is provided, and passes information about that certificate to a callback which must return true for the request to proceed; otherwise, the client is considered unauthorized and the request is aborted.

usage

The https server must be set up to request a client certificate and validate it against an issuer/CA certificate. What follows is a typical example using Express:

var express = require('express');
var fs = require('fs');
var https = require('https');
var clientCertificateAuth = require('client-certificate-auth');

async function getOptions () {
  return {
    // Server SSL private key and certificate
    key: fs.readFileSync('server.key'),
    cert: fs.readFileSync('server.pem'),
    // issuer/CA certificate against which the client certificate will be
    // validated. A certificate that is not signed by a provided CA will be
    // rejected at the protocol layer.
    ca: fs.readFileSync('cacert.pem'),
    // request a certificate, and *do* reject connections from
    // clients providing an untrusted or no certificate.
    requestCert: true,
    rejectUnauthorized: true
  }
};

var app = express();

// add clientCertificateAuth to the middleware stack, passing it a callback
// which will do further examination of the provided certificate.
app.use(clientCertificateAuth(getOptions, checkAuth));
app.use(app.router);
app.use(function(err, req, res, next) { console.log(err); next(); });

app.get('/', function(req, res) {
  res.send('Authorized!');
});

var checkAuth = function(cert) {
 /*
  * allow access if certificate subject Common Name is 'Doug Prishpreed'.
  * this is one of many ways you can authorize only certain authenticated
  * certificate-holders; you might instead choose to check the certificate
  * fingerprint, or apply some sort of role-based security based on e.g. the OU
  * field of the certificate. You can also link into another layer of
  * auth or session middleware here; for instance, you might pass the subject CN
  * as a username to log the user in to your underlying authentication/session
  * management layer.
  */
  return cert.subject.CN === 'Doug Prishpreed';
};

getOptions().then(opts => {
  https.createServer(opts, app).listen(4000);
})

Or secure only certain routes:

app.get('/unsecure', function(req, res) {
  res.send('Hello world');
});

app.get('/secure', clientCertificateAuth(getOptions, checkAuth), function(req, res) {
  res.send('Hello authorized user');
});

checkAuth can also be asynchronous:

function checkAuth(cert, callback) {
  callback(true);
}

app.use(checkAuth);

About

middleware for Node.js implementing client SSL certificate authentication/authorization

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • JavaScript 100.0%