Replies: 1 comment 6 replies
-
Usually this kind of additional security is done by adding a SSL client certificate. |
Beta Was this translation helpful? Give feedback.
6 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello.
I have suggestion (or question) about additional level of rocket.chat security. Probably many people would like to protect their company's rocket.chat instances with VPN or other additional level of security - nobody likes to open services to the public internet due to scanning bots and sudden security vulnerabilities.
VPN is not convenient and reduces usability of mobile apps. The most easy way is to protect rocket.chat server with nginx which accepts some kind of auth. It should be some additional header or cookie (actually cookie is a kind of headers but it can have expiration which is more useful).
Actually I already tested this scheme with nginx + cookie: to get into the rocket.chat user has to field web form with his email in allowed domain. Python backend does all the magic - it sets some keys in redis and sends email with two deeplinks to user. First link sets cookie, second link contains real rocket.chat deeplink with access token. We tested it on android and iPhone clients - it works. May be not very clear but it works. Cookie is per-user-basis. DeepLink should be only one and mobile clients should set this accessCookie on every request. Cookie should be passed to the mobile client via additional deepLink parameter which is not yet implemented.
My question/suggestion: is it good idea to do feature request about adding yet another parameter to deep link with access cookie ? May be even we can do pull request about this. Or may be there is another useful way to protect rocket.chat server from public network ?
Beta Was this translation helpful? Give feedback.
All reactions