Handling server webservice calls

In modern applications, web application may need to request some other web applications on behalf of the authenticated users. There are three ways to do this:

  • the Ugly : provide to all applications SSO cookie. Not secured because SSO cookie can be caught and used everywhere, every time by everyone!!! NOT RECOMMENDED.

  • the Bad (Secure Token Handler) : Deprecated. Can be used in specific cases

  • the Good (Service Token Handler): See below ! (Thanks Sergio…)

The “Bad” method consists to give the token (cookie value) to WebApp1 which uses it as cookie header in its request. Since 2.0 version, LL::NG gives a better way (the Good !) to do this by using limited scope tokens.

Tokens are time limited (30 seconds by default) and URL restricted.


Webapp1 handler configuration

Select Main handler type to protect WebApp1 and insert a header named X-Llng-Token filled with this value:

token( $_session_id, 'webapp2.example.com', 'webapp3.example.com', 'serviceHeader1=webapp1.example.com', "testHeader=$uid" )

WebApp1 can read this header and use it in its requests by setting the X-Llng-Token header. The token is built by using the session ID and authorized virtualhosts list. By default, the Service Token is only available during 30 seconds and for specified virtualhosts. The token can be use to send service headers to webapp2 like origin host by example.

You can set ServiceToken TTL in the virtualHost options in Manager for each required virtualHost.

You can also set ServiceToken default timeout (30 seconds) by editing lemonldap-ng.ini in section [handler]:

handlerServiceTokenTTL = 30


Service token timeout can be set for each virtual hosts.

Webapp2 handler configuration

Change handler type to ServiceToken. So it is able to manage both user and server connections. And that’s all !