REST API
The following is a set of tests which are used for developing. You can use them for your own set of tests.
Backend channel
Important!: Make sure to hide the following endpoints to the public internet:
Protocol endpoints
- /api/v1/auth/json
A general purpose endpoint using JSON - /api/v1/auth/header
Designed to be used with any service that can deal with HTTP request and response headers
Protocol specific endpoints
- /api/v1/auth/nginx
Designed to be used with Nginx - /api/v1/auth/saslauthd
Designed to be used with cyrus-saslauthd and its httpform backend.
REST calls
- /api/v1/cache/flush
- /api/v1/bruteforce/flush
Frontend channel
HTTP basic authorization
Important!: Please open this only if you really need it! It lacks the capability for two-factor authentication
- /api/v1/auth/basic
OAuth-2.0 OpenID-Connect
The following endpoints may be open for public access:
- /login
- /login/post
- /consent
- /consent/post
- /logout
- /logout/post
Manage two-factor authentication requests
The following endpoints may be open for public access:
- /2fa/v1/register
Other endpoints
Nauthilus may call the notification page to display errors or other user information.
- /notify
A query parameter named message will be taken from the URL and displayed nicely in a template.
Normal user authentication
POST http://127.0.0.1:8080/api/v1/auth/header
Accept: */*
Auth-Method: plain
Auth-User: testuser
Auth-Pass: testpassword
Auth-Protocol: imap
Auth-Login-Attempt: 0
Client-IP: 127.0.0.1
X-Client-Port: 12345
X-Client-Id: Test-Client
X-Local-IP: 127.0.80.80
X-Auth-Port: 143
Auth-SSL: success
Auth-SSL-Protocol: secured
###
Example output:
HTTP/1.1 200 OK
Auth-Status: OK
Auth-User: testaccount@example.test
X-Nauthilus-Session: 2HDQSPruG03RGBCtVuu52ZL18Ip
X-Nauthilus-Rnsmsdovecotfts: solr
X-Nauthilus-Rnsmsdovecotftssolrurl: url=http://127.0.0.1:8983/solr/dovecot
X-Nauthilus-Rnsmsmailpath: sdbox:~/sdbox
X-Nauthilus-Rnsmsoverquota: FALSE
X-Nauthilus-Rnsmsquota: 5242880
Date: Mon, 07 Nov 2022 10:32:54 GMT
Content-Length: 2
Content-Type: text/plain; charset=utf-8
OK
Flush a user from Redis cache
DELETE http://127.0.0.1:8080/api/v1/cache/flush
Accept: */*
Content-Type: application/json
{"user": "testuser"}
###
Example output:
HTTP/1.1 200 OK
Content-Type: application/json
Date: Mon, 07 Nov 2022 10:47:31 GMT
Content-Length: 120
{
"guid": "2HDSEmkavbN4Ih3K89gBBPAGwPy",
"object": "cache",
"operation": "flush",
"result": {
"user": "testuser",
"status": "flushed"
}
}
Note:
If you specify '*' (without the single quotes) as the user argument, then all users are flushed from the caches.
Flush an IP address from a brute force bucket
DELETE http://127.0.0.1:8080/api/v1/bruteforce/flush
Accept: */*
Content-Type: application/json
{"ip_address": "x.x.x.x", "rule_name": "testrule"}
###
Example output:
HTTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Date: Wed, 22 Mar 2023 12:36:33 GMT
Content-Length: 144
{
"guid": "2NMzAHKLwpSk6d20cJ4Zqj6hEAB",
"object": "bruteforce",
"operation": "flush",
"result": {
"ip_address": "x.x.x.x",
"rule_name": "testrule",
"status": "flushed"
}
}
Note:
If you specify '*' (without the single quotes) as the rule_name argument, then all buckets an IP belongs to are flushed from the caches.
Get a list with all known IP addresses that have been blocked
DELETE http://127.0.0.1:8080/api/v1/bruteforce/list
Accept: */*
###
Example output:
TTP/1.1 200 OK
Content-Type: application/json; charset=utf-8
Date: Mon, 27 Mar 2023 09:05:22 GMT
Content-Length: 123
{
"guid": "2Nah6CvEP1ZK46u6M1GBl8ZuH01",
"object": "bruteforce",
"operation": "list",
"result": {
"ip_addresses": "ip_addresses": {
"2a05:bec0:abcd:1::4711": "ua_1d_ipv6"
},
"error": "none"
}
}
Mode no-auth
POST http://127.0.0.1:8080/api/v1/auth/header?mode=no-auth
Accept: */*
Auth-Method: plain
Auth-User: testuser
Auth-Protocol: imap
Auth-Login-Attempt: 0
Client-IP: 127.0.0.1
X-Client-Port: 12345
X-Client-Id: Test-Client
X-Local-IP: 127.0.80.80
X-Auth-Port: 143
Auth-SSL: success
Auth-SSL-Protocol: secured
###
Example output:
HTTP/1.1 200 OK
Auth-Status: OK
Auth-User: testaccount@example.test
X-Nauthilus-Session: 2HDSiJqz9MrisZmLAt6iiobOuLQ
X-Nauthilus-Rnsmsdovecotfts: solr
X-Nauthilus-Rnsmsdovecotftssolrurl: url=http://127.0.0.1:8983/solr/dovecot
X-Nauthilus-Rnsmsmailpath: sdbox:~/sdbox
X-Nauthilus-Rnsmsoverquota: FALSE
X-Nauthilus-Rnsmsquota: 5242880
Date: Mon, 07 Nov 2022 10:51:26 GMT
Content-Length: 2
Content-Type: text/plain; charset=utf-8
OK
Mode list-accounts
GET http://127.0.0.1:8080/api/v1/auth/header?mode=list-accounts
Accept: */*
###
The result is a list with all accounts - line by line. If you use "application/json" for Accept, the result will be a JSON list. If you speficy "application/x-www-form-urlencoded", the service returns a byte array with all accounts.
Nginx
POST http://127.0.0.1:8080/api/v1/auth/nginx
Accept: */*
Auth-Method: plain
Auth-User: testuser
Auth-Pass: testpassword
Auth-Protocol: imap
Auth-Login-Attempt: 0
Client-IP: 127.0.0.1
X-Auth-Port: 143
Auth-SSL: success
Auth-SSL-Protocol: secured
###
Example output:
HTTP/1.1 200 OK
Auth-Port: 9931
Auth-Server: 127.0.0.1
Auth-Status: OK
Auth-User: testaccount@example.test
X-Nauthilus-Session: 2HDTGUWG6hNRLfHwafEzDkaZLEC
Date: Mon, 07 Nov 2022 10:55:58 GMT
Content-Length: 2
Content-Type: text/plain; charset=utf-8
OK
saslauthd with http backend
To use this mode, you need to install saslauthd and configure it to use to http backend:
/etc/saslauthd.conf
httpform_host: 127.0.0.1
httpform_port: 9080
httpform_uri: /api/v1/auth/saslauthd
httpform_data: protocol=submission&port=587&method=plain&tls=success&security=starttls&user_agent=saslauthd/2.1.27&username=%u&realm=%r&password=%p
Running saslauthd
/usr/sbin/saslauthd -m /run/saslauthd -a httpform
Using this service prevents nauthilus from finding out the real remote client address. Consider using Dovecot with the submission proxy service.
POST http://127.0.0.1:8080/api/v1/auth/saslauthd
Accept: */*
Content-Type: application/x-www-form-urlencoded
protocol=submission&port=587&method=plain&tls=success&security=starttls&user_agent=Test-Client&username=testuser&realm=&password=testpassword
###
Example output:
HTTP/1.1 200 OK
Auth-Status: OK
Auth-User: testaccount@example.test
X-Nauthilus-Session: 2HDTeoN5dIpcNRvOZt2FNMIrTq3
Date: Mon, 07 Nov 2022 10:59:11 GMT
Content-Length: 2
Content-Type: text/plain; charset=utf-8
OK
JSON query endpoint
POST http://127.0.0.1:8080/api/v1/auth/json
Content-Type: application/json
{
"username": "exampleUser", // Required: The identifier of the client/user sending the request
"password": "examplePass", // Optional: The authentication credential of the client/user sending the request
"client_ip": "192.168.1.1", // Optional: The IP address of the client/user making the request
"client_port": "8080", // Optional: The port number from which the client/user is sending the request
"client_hostname": "client.example.com", // Optional: The hostname of the client which is sending the request
"client_id": "client123", // Optional: The unique identifier of the client/user, usually assigned by the application
"local_ip": "10.0.0.1", // Optional: The IP address of the server or endpoint receiving the request
"local_port": "443", // Optional: The port number of the server or endpoint receiving the request
"service": "loginService", // Required: The specific service that the client/user is trying to access with the request
"method": "LOGIN", // Optional: The HTTP method used in the request (e.g., PLAIN, LOGIN, etc.)
"auth_login_attempt": 1, // Optional: A flag indicating if the request is an attempt to authenticate (login)
"ssl": "on", // Optional: Identfier, if TLS is used. Any non-empty value activates the usage of TLS for the transport
"ssl_session_id": "abc123", // Optional: The session ID of the SSL/TLS handshake
"ssl_client_verify": "SUCCESS", // Optional: The result of the client certificate verification
"ssl_client_dn": "CN=Client,C=US", // Optional: The distinguished name of the client certificate
"ssl_client_cn": "ClientCN", // Optional: The common name in the client certificate
"ssl_issuer": "IssuerOrg", // Optional: The issuer of the SSL/TLS certificate
"ssl_client_notbefore": "2023-01-01T00:00:00Z", // Optional: The start date of the client certificate validity
"ssl_client_notafter": "2023-12-31T23:59:59Z", // Optional: The end date of the client certificate validity
"ssl_subject_dn": "CN=Client,C=US", // Optional: The subject distinguished name of the SSL/TLS certificate
"ssl_issuer_dn": "CN=Issuer,C=US", // Optional: The issuer distinguished name of the SSL/TLS certificate
"ssl_client_subject_dn": "CN=Client,C=US", // Optional: The subject distinguished name of the client certificate
"ssl_client_issuer_dn": "CN=Issuer,C=US", // Optional: The issuer distinguished name of the client certificate
"ssl_protocol": "TLSv1.2", // Optional: The protocol of the SSL/TLS connection
"ssl_cipher": "ECDHE-RSA-AES256-GCM-SHA384", // Optional: The cipher suite used in the SSL/TLS connection
"ssl_serial": "0123456789ABCDEF", // Optional: The serial number of the SSL/TLS certificate
"ssl_fingerprint": "AA:BB:CC:DD:EE:FF" // Optional: The fingerprint of the SSL/TLS certificate
}
Example output:
HTTP/1.1 200 OK
Auth-Status: OK
Auth-User: testaccount@example.test
Content-Type: application/json
X-Nauthilus-Session: 2MNJnKgGpgGJ5rRuFGcTltWefrO
Date: Tue, 28 Feb 2023 16:37:51 GMT
Content-Length: 656
{
"AccountField": "entryUUID",
"TOTPSecretField": "",
"Password": "***HASHED***",
"Backend": "ldapPassDB",
"Attributes": {
...
}