Return-Path: X-Original-To: apmail-taverna-dev-archive@minotaur.apache.org Delivered-To: apmail-taverna-dev-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 724011845D for ; Tue, 26 May 2015 09:38:42 +0000 (UTC) Received: (qmail 93973 invoked by uid 500); 26 May 2015 09:38:42 -0000 Delivered-To: apmail-taverna-dev-archive@taverna.apache.org Received: (qmail 93935 invoked by uid 500); 26 May 2015 09:38:42 -0000 Mailing-List: contact dev-help@taverna.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@taverna.incubator.apache.org Delivered-To: mailing list dev@taverna.incubator.apache.org Received: (qmail 93924 invoked by uid 99); 26 May 2015 09:38:42 -0000 Received: from Unknown (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 26 May 2015 09:38:42 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id 8C4AF1A3497 for ; Tue, 26 May 2015 09:38:41 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.021 X-Spam-Level: X-Spam-Status: No, score=-0.021 tagged_above=-999 required=6.31 tests=[RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=disabled Received: from mx1-us-west.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id 0I8Z2kO0UcP0 for ; Tue, 26 May 2015 09:38:34 +0000 (UTC) Received: from clarity.mcc.ac.uk (clarity.mcc.ac.uk [130.88.200.144]) by mx1-us-west.apache.org (ASF Mail Server at mx1-us-west.apache.org) with ESMTPS id 8E10F2123F for ; Tue, 26 May 2015 09:38:34 +0000 (UTC) Received: from asmtp1.its.manchester.ac.uk ([130.88.13.149]) by clarity.mcc.ac.uk with esmtps (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.85 (FreeBSD)) (envelope-from ) id 1YxBIN-000F8Z-5T; Tue, 26 May 2015 10:37:11 +0100 Received: from cspool92.cs.man.ac.uk ([130.88.195.192]:57296) by asmtp1.its.manchester.ac.uk with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.83) (envelope-from ) id 1YxBIM-00055e-RN; Tue, 26 May 2015 10:37:10 +0100 Message-ID: <55643EC8.2090004@manchester.ac.uk> Date: Tue, 26 May 2015 10:37:12 +0100 From: "Donal K. Fellows" Organization: University of Manchester User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: dev@taverna.incubator.apache.org CC: larryakah@gmail.com Subject: Re: GSoC android app update and availability for first weeks of GSoC References: <2C733198BCF73948947E47FE746D0F4E18F32992@MBXP14.ds.man.ac.uk> <555F5DA9.1030808@googlemail.com> <5561F3C5.4070508@manchester.ac.uk> In-Reply-To: Content-Type: multipart/mixed; boundary="------------030201080307050106010805" X-Authenticated-Sender: Donal Fellows from cspool92.cs.man.ac.uk [130.88.195.192]:57296 X-Authenticated-From: donal.k.fellows@manchester.ac.uk X-SA-Exim-Connect-IP: 130.88.13.149 X-SA-Exim-Mail-From: donal.k.fellows@manchester.ac.uk X-SA-Exim-Scanned: No (on clarity.mcc.ac.uk); SAEximRunCond expanded to false --------------030201080307050106010805 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit On 25/05/2015 10:00, Larry Akah wrote: > So I want to know against which server they do so. That is, which server > holds the user accounts against which they authenticate. The server url to > which to post data for authentication. Some useful documentation about that > would help since i have searched and not yet found one that explains user > authentication with a server. The server itself holds the user account details; they're configured through the administrative interface (which is a webapp that is only open to people with the admin permission flag set). We don't currently support logging in with accounts defined elsewhere; even if we did, we'd just be delegating authentication, not authorization. The credentials are stored in the internal database, hashed with bcrypt. You have to provide them on each call (except a very few used to fetch general metadata) using HTTP Basic Auth, which we selected because it is extremely widely supported by clients. It does however mean that it is strongly recommended that communications channels between the server and the clients be secure; HTTPS is one way of doing this, as is co-locating the server and its client portal on a shared secure network (relatively easy to do these days). Is the Taverna Server documentation missing this? It could well be. If it is, let me know and I'll fix it. :-) Donal. --------------030201080307050106010805--