Replies: 1 comment 10 replies
-
Unfortunately this sounds very niche for us to provide by default. If you already have firewall / VPN access, aren't they passing any tokens to the underlying application that we could use? |
Beta Was this translation helpful? Give feedback.
10 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
My plan is to have a Phoenix application running at
https://myapp.example.edu/
and a (firewalled, VPN-access only) Livebook instance athttps://myapp.example.edu:8080/
that will be used to do some maintenance/administrative tasks and experimentation within the main app's runtime via Remote Execution smart cells. From reading some other issues and discussions, it sounds like this isn't an uncommon use case.The main application already has session-based authentication (derived from our institutional single sign-on, but that's not really important to this discussion). Since Livebook will be running on the same host but a different port, it's easy to surface the same session cookie in Livebook.
What I'd like to be able to do is configure Livebook with something like:
To authenticate, Livebook could then
to let the remote runtime look at the incoming request and decide whether the user should have Livebook access.
This would essentially make Livebook as secure (or not) as the remote runtime already is. Would this be a good candidate to add to Livebook core? I might put some time into implementing it either way, but it would be good to start out knowing whether it would be welcome as a PR.
Beta Was this translation helpful? Give feedback.
All reactions