Table of Contents

Security - (Proxy|N-tier|User Impersonation) authentication

About

A proxy authentication is when you are authorized to login (authenticate) in a software on behalf of an other.

This is known as:

Impersonation is a feature which permit to establish a session on behalf of a user without employing the user's credentials (password, …)

Example

HTTP Request

In Kubernetes, 1), they used the following HTTP request headers to perfor an impersonation request:

If the user has the right to impersonate the Impersonate-User or the Impersonate-Group, it will be authenticated with them.

Example: impersonating a user with groups and extra fields

Impersonate-User: [email protected]
Impersonate-Group: developers
Impersonate-Group: admins
Impersonate-Extra-dn: cn=jane,ou=engineers,dc=example,dc=com
Impersonate-Extra-acme.com%2Fproject: some-project
Impersonate-Extra-scopes: view
Impersonate-Extra-scopes: development
Impersonate-Uid: 06f6ce97-e2c5-4ab8-7ba5-7654dd08d52b