Three years ago I wrote about what I call the "Back to the Web" pattern. This week that pattern came up twice and we added some functionality related to it. Read on to refresh your memory.
The back to the web pattern is about sending a link to your client which permits them to access some information in your coreBOS install, either to just see it or to permit them to validate and update parts of it.
coreBOS gives you a lot of ways to send the link to your client. We have support for:
In the post I wrote three years ago, I suggest sending the client a URL with the internal ID of the record you want your client to see, like this
the issue with that URL is that anyone can easily change the "123" to access information of a record they shouldn't be able to access. We have to add some level of security there depending on the specific requirements of each case, in other words, depending on how sensible the information you are exposing is and what you permit the user to do (update, delete, ...).
One basic protection that must be added is to substitute the ID with a random identifier. The procedure to accomplish this in coreBOS is:
select * from some_module where externalid='value_from_link';
Now that is a very basic and fundamental change to implement, but it is not really secure. It is just a matter of resources to calculate another valid external ID, and there are people out there that are bored enough to dedicate those resources to find it. In fact, the only difference from using "123" is that you made it harder to find a valid value. So, if the information you are exposing is of some delicate nature you must do some more work.
I am just going to comment on a couple of ideas to get you on your way.
The easiest one is to add two-factor authentication to access the information. When the user clicks on the notification URL, we check if the external ID is valid. If it is, that will give us access to the client information and we can send them another code that they must introduce to get access to the record.
The next option is to create a portal application. That application would require your users to login to the application where you know that the information is restricted to what that user has permission to see and where access is protected in other ways. You can get really inventive with this option.
Our goal here is to add a minimum layer of security without it getting in the way of functionality (as it always is with security).
Photo by Andrey Tikhonovskiy on Unsplash