Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SPIKE: Investigate security for EA <-> RPC-Go authentication #11

Open
5 of 7 tasks
mechris1 opened this issue Jan 2, 2024 · 0 comments
Open
5 of 7 tasks

SPIKE: Investigate security for EA <-> RPC-Go authentication #11

mechris1 opened this issue Jan 2, 2024 · 0 comments
Assignees

Comments

@mechris1
Copy link

mechris1 commented Jan 2, 2024

Need to know if managed devices are Windows only or Windows/Linux. This is with respect to configuring TLS certificated signed by CA

  • Windows
  • Linux

For Linux, we can leverage the self-signed cert flow

EA can currently be deployed on Windows only and support Microsoft CA only.

  • WebSocket API or HTTP API for EA?
    Should EA have a WebSocket API or HTTP API? Does RPS make just 1 call to EA to get a TLS certificate then HTTP API makes sense?

    1. Decided to implement a REST API in the Enterprise Application (EA) to facilitate communication with RPC-GO in an enterprise environment.
    2. Chose REST API over other protocols because there is no continuous data stream expected.
    3. Previously developed a WebSocket for cloud-based deployment, enabling easier access to the RPS with firewalls within enterprise
    4. Maintained an established connection so that RPS can communicate with EA as needed.

  • Verify the CSR handling flow for TLS and IEEE 802.1x.
    Will only 1 API be enough for handling both flows?
    An End point "/Configure" will be created at EA

  • TLS Session between EA and RPC-Go

  • Authentication Mechanism for RPC-Go with EA
    Should we use an API Key, JWT Token, or another method for authentication?
    Determine the preferred authentication mechanism and discuss how to pass this information in RPC-GO for secure authentication.
    A few points were discussed regarding Authentication:

    1. There's a need to establish a dedicated authentication server to verify all endpoints across the entire toolkit.
    2. For the time being, we plan to introduce an additional endpoint named 'authentication' within the Enterprise Application (EA) to handle this task.

  • Document findings and review with team
    Discussed with Mike and Ganesh. Updated the meeting notes.

@mechris1 mechris1 converted this from a draft issue Jan 2, 2024
@mechris1 mechris1 moved this from Backlog to Todo in Sprint Planning Jan 2, 2024
@madhavilosetty-intel madhavilosetty-intel self-assigned this Jan 3, 2024
@madhavilosetty-intel madhavilosetty-intel moved this from Todo to In Progress in Sprint Planning Jan 4, 2024
@madhavilosetty-intel madhavilosetty-intel moved this from In Progress to Done in Sprint Planning Jan 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

No branches or pull requests

2 participants