This is an old revision of the document!


Member Portal V2

This is a project driven by @samp20 to build a new member portal to provide Single-Sign-On (SSO) to other Hackspace services.

The current proposed architecture is a Python Flask application with PostgreSQL as the backend database.

Sessions will be referenced by long-lived cookies (e.g. 30 days) that get refreshed on use. The session data itself will be stored in a Session table. The currently planned data includes:

Column Type Description
id UUID Session ID
secret str Rotated session cookie secret
member_id FK The member this session is for
created DateTime When the session was first created
last_active DateTime When the session was last used
last_email_auth Optional[DateTime] When an email authentication was performed
last_keyfob_auth Optional[DateTime] When a keyfob authentication was performed
last_totp_auth Optional[DateTime] When a TOTP authentication was performed
last_passkey_auth Optional[DateTime] When a passkey authentication was performed

The session's current authentication level will be calculated based on the fields in the Session table. The exact rules are still to be determined, however they will fit into the following levels:

  1. Plastic. The lowest authentication level when using a keyfob login.
  2. Bronze. Sessions that haven't authenticated in a while.
  3. Silver. Sessions that authenticated recently but didn't use 2fa.
  4. Gold. Sessions that authenticated recently with 2fa.

In OpenID terminology this is called the ACR.

Permissions shall be granted through OAuth scopes or other custom claims. As these claims can sometimes be application specific, a general purpose approach is proposed using Members, Roles and ClaimSets with the following relationships:

  • Many-to-many between Members and Roles
  • One-to-many between Roles and ClaimSets

A Role describes a high-level role a member has, for example “onboarding”. A ClaimSet describes the specific OAuth claims associated with that role. The reason for separating ClaimSets from Roles is to be able to limit a ClaimSet to a single OAuth client without requiring a member to join multiple Roles if that Role involves multiple clients.

An example ClaimSet for Grafana access to the “viewer” team may look like the following:

{
    "scope": ["openid", "email"],
    "groups": ["viewer"]
}

This ClaimSet would be restricted to the Grafana OAuth client in order to avoid granting the “openid” scope to other clients and inadvertently giving access to them.

  • projects/member_portal/home.1759765176
  • Last modified: 13 hours ago
  • by samp20