Up to now we have allowed anonymous access for our application. We will now introduce authentication and authorization to secure our application.
Authentication forces users to log on and identify themselves, before they can use the application.
Authorization defines what a certain user can do.
Authentication and Authorization are managed using the XS Advanced UAA service which uses OAuth and supports HANA and SAML2 authentication.
Open the file cpl166js/server.js
and comment the following line to disable anonymous access:
var options = xsjs.extend({
// anonymous: true, // remove to authenticate calls
redirectUrl: “/index.xsjs”
});
Configure the cpl166ui module to use authentication by opening the file cpl166ui/xs-app.json
and changing the authenticationMethod
attribute to route
like this:
"authenticationMethod": "route",
Once we switch on the authentication for the ui module, the XS Advanced runtime will require any HTTP update request (PUT, POST, DELETE) to present a valid CSRF token. This is a standard security technique to prevent cross-side request forgery.
The following code will fetch the CSRF token when the application is first loaded and add it automatically to the HTTP header of each update request.
Append the following code to the end of cpl166ui/resources/Util.js
:
$(function() {
$.ajax({
type: 'GET',
url: '/',
headers: {'X-Csrf-Token': 'Fetch'},
success: function(res, status, xhr) {
var sHeaderCsrfToken = 'X-Csrf-Token';
var sCsrfToken = xhr.getResponseHeader(sHeaderCsrfToken);
$(document).ajaxSend(function(event, jqxhr, settings) {
if(settings.type === 'POST' || settings.type === 'PUT' || settings.type === 'DELETE') {
jqxhr.setRequestHeader(sHeaderCsrfToken, sCsrfToken);
}
});
}
});
});
In order to bind our application modules to the UAA service at run time, we first need to define a new UAA service instance. To do so, add a new resource in the mta.yaml file:
Next, we define the dependency of the cpl166ui
and cpl166js
modules to this resource. This will bind the modules automatically to the UAA service instance.
Add a new entry in the requires section of both modules:
In addition we want the authentication token acquired at runtime by the frontend (cpl166ui) module to be automatically forwarded to the back-end module (cpl166js
).
Add an additional property forwardAuthToken: true
to the destinations property of the cpl166ui
module in the mta.yaml
:
Check your timing and rather continue with Exercise 5.
Otherwise your next challenge is to enhance the application with authorization checking code.
We will introduce two categories of users: those who can only view the country information, and those who are authorized to add new countries.
The XS Advanced security concept is based on scopes.
Scopes are functional authorization units in the context of an application, e.g. the permission to create a new country could be encapsulated by a scope called CreateCountry
.
Scopes can be assigned to roles which in turn can be assigned to users.
An application can also define a role-template which simplifies the process of creating new roles for administrators.
With the concept explained, we can now go ahead and enable authorization for our application. This involves the following steps:
- Define scopes and role-templates in the security configuration file (xs-security.json)
- Recreate the UAA service instance based on the xs-security.json configuration
- Add authorization checks in the front- and back-end modules
- Create roles and role collections from templates and assign them to users
The 'xs-security.json' file is a configuration file that defines the scopes used by the application and role-templates that consolidate the scopes into functional roles.
Create an xs-security.json file in the root folder of your project with the following content.
{
"xsappname": "CPL166MTA",
"scopes": [
{
"name": "$XSAPPNAME.view",
"description": "View data"
},
{
"name": "$XSAPPNAME.create",
"description": "Create data"
}
],
"role-templates": [
{
"name": "cpl166View",
"description": "Role for viewing data",
"scope-references": [ "$XSAPPNAME.view"]
},
{
"name": "cpl166Create",
"description": "Role for creating data",
"scope-references": [ "$XSAPPNAME.create", "$XSAPPNAME.view"]
}
]
}
The file defines two scopes; one to only view data and another to create data. The scopes are consolidated in two role-templates. Notice that the role-template cpl166Create
includes both scopes to view and create data. Consolidation of multiple scopes should be done on this level, while scopes should always only represent one single privilege.
Now we need to update the UAA resource, defined in the mta.yaml
file, to use the xs-security.json file. To do so, add a new parameter in the resources section. Key is path
and value is ./xs-security.json
Next we need to update our UAA service instance with the new authorization configuration defined in the xs-security.json file. To do that, download the file from your project in Web IDE to a folder accessible from your command line tool. Right click on xs-security.json and select "Export". The file will now be in your local "Downloads" folder.
Open a command prompt and navigate to the "Downloads" folder by entering the following cd command and confirming with enter.
cd Downloads
Next we need to login to XS Advanced in order to create the UAA service instance. This can be done with the following command (confirm with enter). You might need to adapt the API URL to your specific system. Enter the credentials and select the space "DEV" or "development".
xs login -a https://hxehost:39030 --skip-ssl-validation
If the space "DEV" or "development" cannot be selected, change the current targeted space by
xs target -s DEV
Run the following xs command:
xs create-service xsuaa devuser cpl166_uaa -c ./xs-security.json
To enable authorization in App Router based application modules (such as cpl166ui
), we need to specify the scope a user must be assigned to in order to access the resources of a specific route. The assignment of scopes to routes is done in the xs-app.json file.
In order to impose authorization checks on any request to our application, we need to add an additional general route, and assign the right scope to it. Add the following in the mentioned order.
- Add the view scope to the
/euro.xsodata
in thecpl166ui/xs-app.json
file so that it looks like in the listing below
{
"source": "^/euro.xsodata/.*$",
"destination": "cpl166js_be",
"scope": "$XSAPPNAME.view"
},
- Add the create scope to the xsjs route so that it looks like in the listing below
{
"source": ".*\\.xsjs",
"destination": "cpl166js_be",
"scope": "$XSAPPNAME.create"
},
- Add a general route with the view scope assigned to it underneath the other routes
{
"source": "^/(.*)$",
"localDir": "resources",
"scope": "$XSAPPNAME.view"
}
In the end the complete xs-app.json
file should look like this
{
"welcomeFile": "index.html",
"authenticationMethod": "route",
"routes": [
{
"source": "^/euro.xsodata/.*$",
"destination": "cpl166js_be",
"scope": "$XSAPPNAME.view"
},
{
"source": ".*\\.xsjs",
"destination": "cpl166js_be",
"scope": "$XSAPPNAME.create"
},
{
"source": "^/(.*)$",
"localDir": "resources",
"scope": "$XSAPPNAME.view"
}
]
}
For the changes to take effect, stop and rerun the cpl166js
and cpl166ui
modules. Once you have restarted the modules, the application will become inaccessible since your user has not been assigned the required role collection yet. This will be done in the next step.
Next we need to create actual roles from the role-template using the Application Role Builder, which is part of the XS Advanced Administration Tools.
To open the Administration Tools, we need to find out the url. Therefore open a command prompt and type in the following xs command to switch to the "SAP" space:
xs target -s SAP
Then type the following command to show the url:
xs app xsa-admin --urls
Copy the url and paste it into the address bar of a new incognito tab of Chrome. You will need to login with the XSA_ADMIN user. The Administration Tools overview page will open.
Navigate to the "Application Role Builder" by clicking on the respective tile. Click on "Configure Role Collections" in the bottom right corner.
Create a new role collection by clicking on the +
icon.
Enter the name cpl166_collection
and confirm. Now select the new created role collection in the list on the left side. A detail view will open on the right side of the screen. Switch to the "Roles" tab.
Now we will add the two application roles that we have created in the xs-security.json file. Therefore click on "Add application Role". Select our CPL166MTA application from the list. Select the template "cpl166View" and the application role "cpl166View". Do the same for the create template.
Save the role collection by clicking on the "Save" button. Return to the overview page by clicking on the "Home" button in the top left corner. Now open the "User Management" application. Select the user you are testing the application with (for example "XSA_DEV" or "XSA_ADMIN").
Switch to the "Role Collections" tab.
Click on the "Add" button to add assign a role collection. Select the new role collection "cpl166_collection" by ticking the checkbox and confirm with ok.
Complete the assignment by clicking on the "Save" button.
Now feel free to test your application with the user you have assigned the role collection to. This might require a browser restart or a new incognito session!
Continue with Exercise 5