How can we protect parts of the API behind the network firewall #6396
Replies: 3 comments 1 reply
-
The problem I see with (1) is that it forces us into duplicating schema objects to support different permissions, which is an approach we are consciously moving away from, I think. (3) sounds interesting. Maybe add a login endpoint that is only available on the VPN and if you use that you are validated? At my last job, we used the hire date and termination date from HR to expire accounts. Is there an endpoint that, given a PRI, could tell us if the employee is active? |
Beta Was this translation helpful? Give feedback.
-
Lighthouse now links to this document of best-practice recommendations for GraphQL, which includes this recommendation for dealing with different levels of access: https://graphql-rules.com/rules/authorization-schema-diffing |
Beta Was this translation helpful? Give feedback.
-
Because we're using Sign in Canada, a user does not lose their account if they leave government. Our main tool to ensure they are still a government user is that they still have access to the government network. We can easily but some endpoints behind the firewall, like /admin, but everything important happens via the API.
How do we ensure that only current government employees can take privileged actions on the API?
Some ideas:
Beta Was this translation helpful? Give feedback.
All reactions