-
Notifications
You must be signed in to change notification settings - Fork 20
Description
Proposal Date
2022-12-08
Target Ticket Acceptance Date
2022-12-23
Earliest Open edX Named Release Without This Functionality
Q - 2023-10
Rationale
The use of BearerAuthentication was informally documented as deprecated in OEP-42: Authentication, created on 2020-02-28. This OEP was just capturing an earlier (possibly undocumented) decision to deprecate in favor of the newer JWT authentication. At the time OEP-42 was documented, the only reason to keep BearerAuthentication was in support of mobile apps, because they didn't yet support JWT authentication. However, JWT Authentication is now supported for mobile apps as well.
The reason to remove BearerAuthentication is to simplify our authentication to fewer technologies, making it safer and easier to understand.
Removal
- The BearerAuthentication class in ecommerce and all supporting code will be removed.
- The BearerAuthentication class in edx-drf-extensions and all supporting code will be removed.
- The BearerAuthentication class in edx-platform and all supporting code will be removed.
Docs and referencing code will need to be updated. See BearerAuthentication GitHub search results for a start.
This ADR will be partially superseded/updated, because BearerAuthentication would no longer be an option.
Replacement
Usage will be replaced by JwtAuthentication:
| class JwtAuthentication(JSONWebTokenAuthentication): |
Deprecation
There is no active plan.
- The BearerAuthentication class is not currently marked as deprecated, but it could be.
- We could mark as deprecated when access tokens are requested in the form of Bearer (opaque) tokens.
Migration
It should be pretty simple for clients to request a JWT access token, in place of a Bearer token, and pass it in the request header instead.
However, there are some issues to be aware of:
- This might be used by third parties, like other enterprises, and a long enough communication effort would be needed if we don't automatically fix requests.
- Requests currently require a separate authorization header prefix (e.g. "JWT" vs "Bearer" ), so when we ultimately switch default access token requests from Bearer to JWT, we'd either start failing a lot of requests, or we'd need some code to try to fix the header if the wrong one was used (or some other code like this).
- Depending on your config, it is likely that JWTs will expire after an hour, but Bearer tokens would have lasted for 2 weeks? If a third-party is running a long job (> an hour) and reusing a token without checking its expiration, they would run into issues once the token expires.
Additional Info
There is a custom attribute that allows for monitoring of BearerAuthentication usage.
UPDATE: The edx-platform implementation uses the same custom attribute, which is very misleading. Additional monitoring is required to ensure we know which version of the class is in-use so that we can retire the edx-drf-extensions version, and then ultimately retire the edx-platform version.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status