Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
brightspace-auth-keys
Advanced tools
Library for generating, storing, and retrieving keypairs for use in Brightspace's auth framework.
Library for generating, storing, and retrieving keypairs for use in Brightspace's auth framework.
npm install brightspace-auth-keys --save
Step 1. Implement the interface defined by AbstractPublicKeyStore
:
const AbstractPublicKeyStore = require('brightspace-auth-keys').AbstractPublicKeyStore;
class RedisPublicKeyStore extends AbstractPublicKeyStore {
constructor (redisClient) {
super();
// initialization
}
_storePublicKey (key, expiry) {
// "key" is an opaque String representing the public JWK
// "expiry" is the "seconds since unix epoch", after which
// the key should not longer be returned in results
// returns a Promise, resolving after the key is successfully stored
}
_lookupPublicKeys() {
// returns a Promise, resolving with an Array of the stored opaque strings
}
}
Step 2. Instantiate KeyGenerator
:
const KeyGenerator = require('brightspace-auth-keys').KeyGenerator;
const publicKeyStore = new RedisPublicKeyStore(...);
const keyGenerator = new KeyGenerator({
signingKeyType: 'EC',
// other settings
publicKeyStore
});
Step 3. Expose a route for public key retrieval using a routing framework of your choice. The route will be called by D2L Auth Service. Note that your service must be known by the Auth service (present in its DB).
const router = require('koa-router')();
router.get('/auth/.well-known/jwks', function() {
return publicKeyStore
.lookupPublicKeys()
.then(keys => this.body = { keys });
});
router.get('/auth/jwk/:kid', function(kid) {
return publicKeyStore
.lookupPublicKey(kid)
.then(key => this.body = key);
});
app.use(router.routes());
Step 4. Instantiate AuthTokenProvisioner providing
keyGenerator.getCurrentPrivateKey
as a keyLookup
function:
const AuthTokenProvisioner = require('brightspace-auth-provisioning');
const provisioner = new AuthTokenProvisioner({
...
keyLookup: keyGenerator.getCurrentPrivateKey.bind(keyGenerator),
...
});
Now you are able to call provisioner.provisionToken(...)
.
const keyGenerator = new KeyGenerator({
signingKeyType: 'EC', // A type of signing keys to generate. 'RSA' or 'EC'. REQUIRED
signingKeyAge: 3600, // Length of time, in seconds, for a private key to remain in use
signingKeyOverlap: 300, // Length of time, in seconds, for a public key to remain valid
// after its private key has been rotated out. This is effectively
// the maximum lifetime of a signed token.
// RSA-specific settings:
rsa: {
signingKeySize: 2048 // RSA key size, in bits
},
// EC-specific settings:
ec: {
crv: 'P-256' // one of 'P-256', 'P-384', 'P-521'
},
publicKeyStore: new RedisPublicKeyStore(...) // A backend for storing public keys.
// Can be anything: Redis, MSSQL, PostgreSQL, etc.
// REQUIRED
});
FAQs
Library for generating, storing, and retrieving keypairs for use in Brightspace's auth framework.
The npm package brightspace-auth-keys receives a total of 3,721 weekly downloads. As such, brightspace-auth-keys popularity was classified as popular.
We found that brightspace-auth-keys demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.