Skip to main content
Version: 20

Authentication

Authenticating users is necessary when you want to provide specific access rights to web users. Authentication designates the way the information concerning the user credentials (usually name and password) are collected and processed.

Authentication modes

The 4D web server proposes three authentication modes, that you can select in the Web/Options (I) page of the Settings dialog box:

Using a custom authentication is recommended.

Overview

The operation of the 4D web server's access system is summarized in the following diagram:

Requests starting with rest/ are directly handled by the REST server.

Custom (default)

Basically in this mode, it's up to the developer to define how to authenticate users. 4D only evaluates HTTP requests that require an authentication.

This authentication mode is the most flexible because it allows you to:

  • either, delegate the user authentication to a third-party application (e.g. a social network, SSO);
  • or, provide an interface to the user (e.g. a web form) so that they can create their account in your customer database; then, you can authenticate users with any custom algorithm (see this example from the "User sessions" chapter). The important thing is that you never store the password in clear, using such code:
//... user account creation
ds.webUser.password:=Generate password hash($password)
ds.webUser.save()

See also this example from the "Getting started" chapter.

If no custom authentication is provided, 4D calls the On Web Authentication database method (if it exists). In addition to $1 and $2, only the IP addresses of the browser and the server ($3 and $4) are provided, the user name and password ($5 and $6) are empty. The method must return True in $0 if the user is successfully authenticated, then the resquested resource is served, or False in $0 if the authentication failed.

Warning: If the On Web Authentication database method does not exist, connections are automatically accepted (test mode).

Basic protocol

When a user connects to the server, a standard dialog box appears on their browser in order for them to enter their user name and password.

The name and password entered by the user are sent unencrypted in the HTTP request header. This mode typically requires HTTPS to provide confidentiality.

Entered values are then evaluated:

  • If the Include 4D passwords option is checked, user credentials will be first evaluated against the internal 4D users table.
    • If the user name sent by the browser exists in the table of 4D users and the password is correct, the connection is accepted. If the password is incorrect, the connection is refused.
    • If the user name does not exist in the table of 4D users, the On Web Authentication database method is called. If the On Web Authentication database method does not exist, connections are rejected.
  • If the Include 4D passwords option is not checked, user credentials are sent to the On Web Authentication database method along with the other connection parameters (IP address and port, URL...) so that you can process them. If the On Web Authentication database method does not exist, connections are rejected.

With the 4D Client web server, keep in mind that all the sites published by the 4D Client machines will share the same table of users. Validation of users/passwords is carried out by the 4D Server application.

DIGEST protocol

This mode provides a greater level of security since the authentication information is processed by a one-way process called hashing which makes their contents impossible to decipher.

As in BASIC mode, users must enter their name and password when they connect. The On Web Authentication database method is then called. When the DIGEST mode is activated, the $6 parameter (password) is always returned empty. In fact, when using this mode, this information does not pass by the network as clear text (unencrypted). It is therefore imperative in this case to evaluate connection requests using the WEB Validate digest command.

You must restart the web server in order for the changes made to these parameters to be taken into account.

On Web Authentication

The On Web Authentication database method is in charge of managing web server engine access. It is called by 4D or 4D Server when a dynamic HTTP request is received.

Database method calls

The On Web Authentication database method is automatically called when a request or processing requires the execution of some 4D code (except for REST calls). It is also called when the web server receives an invalid static URL (for example, if the static page requested does not exist).

The On Web Authentication database method is therefore called:

  • when the web server receives a URL requesting a resource that does not exist
  • when the web server receives a URL beginning with 4DACTION/, 4DCGI/...
  • when the web server receives a root access URL and no home page has been set in the Settings or by means of the WEB SET HOME PAGE command
  • when the web server processes a tag executing code (e.g 4DSCRIPT) in a semi-dynamic page.

The On Web Authentication database method is NOT called:

Syntax

On Web Authentication( $1 : Text ; $2 : Text ; $3 : Text ; $4 : Text ; $5 : Text ; $6 : Text ) -> $0 : Boolean

ParametersTypeDescription
$1Text<-URL
$2Text<-HTTP headers + HTTP body (up to 32 kb limit)
$3Text<-IP address of the web client (browser)
$4Text<-IP address of the server
$5Text<-User name
$6Text<-Password
$0Boolean->True = request accepted, False = request rejected

You must declare these parameters as follows:

//On Web Authentication database method

C_TEXT($1;$2;$3;$4;$5;$6)
C_BOOLEAN($0)

//Code for the method

Alternatively, you can use the named parameters syntax:

// On Web Authentication database method
#DECLARE ($url : Text; $header : Text; \
$BrowserIP : Text; $ServerIP : Text; \
$user : Text; $password : Text) \
-> $RequestAccepted : Boolean

All the On Web Authentication database method's parameters are not necessarily filled in. The information received by the database method depends on the selected authentication mode).

$1 - URL

The first parameter ($1) is the URL received by the server, from which the host address has been removed.

Let’s take the example of an Intranet connection. Suppose that the IP address of your 4D Web Server machine is 123.45.67.89. The following table shows the values of $1 depending on the URL entered in the Web browser:

URL entered in web browserValue of parameter $1
123.45.67.89/
http://123.45.67.89/
123.45.67.89/Customers/Customers
http://123.45.67.89/Customers/Add/Customers/Add
123.45.67.89/Do_This/If_OK/Do_That/Do_This/If_OK/Do_That

$2 - Header and Body of the HTTP request

The second parameter ($2) is the header and the body of the HTTP request sent by the web browser. Note that this information is passed to your On Web Authentication database method as it is. Its contents will vary depending on the nature of the web browser which is attempting the connection.

If your application uses this information, it is up to you to parse the header and the body. You can use the WEB GET HTTP HEADER and the WEB GET HTTP BODY commands.

For performance reasons, the size of data passing through the $2 parameter must not exceed 32 KB. Beyond this size, they are truncated by the 4D HTTP server.

$3 - Web client IP address

The $3 parameter receives the IP address of the browser’s machine. This information can allow you to distinguish between intranet and internet connections.

4D returns IPv4 addresses in a hybrid IPv6/IPv4 format written with a 96-bit prefix, for example ::ffff:192.168.2.34 for the IPv4 address 192.168.2.34. For more information, refer to the IPv6 Support section.

$4 - Server IP address

The $4 parameter receives the IP address used to call the web server. 4D allows for multi-homing, which allows you to exploit machines with more than one IP address. For more information, please refer to the Configuration page.

$5 and $6 - User Name and Password

The $5 and $6 parameters receive the user name and password entered by the user in the standard identification dialog box displayed by the browser. This dialog box appears for each connection, if basic or digest authentication is selected.

If the user name sent by the browser exists in 4D, the $6 parameter (the user’s password) is not returned for security reasons.

$0 parameter

The On Web Authentication database method returns a boolean in $0:

  • If $0 is True, the connection is accepted.

  • If $0 is False, the connection is refused.

The On Web Connection database method is only executed if the connection has been accepted by On Web Authentication.

WARNING
If no value is set to $0 or if $0 is not defined in the On Web Authentication database method, the connection is considered as accepted and the On Web Connection database method is executed.

  • Do not call any interface elements in the On Web Authentication database method (ALERT, DIALOG, etc.) because otherwise its execution will be interrupted and the connection refused. The same thing will happen if an error occurs during its processing.

Example

Example of the On Web Authentication database method in DIGEST mode:

 // On Web Authentication Database Method
#DECLARE ($url : Text; $header : Text; $ipB : Text; $ipS : Text; \
$user : Text; $pw : Text) -> $valid : Boolean

var $found : cs.WebUserSelection
$valid:=False

$found:=ds.WebUser.query("User === :1";$user)
If($found.length=1) // User is found
$valid:=WEB Validate digest($user;[WebUser]password)
Else
$valid:=False // User does not exist
End if