DEV Community

Cover image for From Zero to Hero (▀̿Ĺ̯▀̿ ̿) in Authentication | Part 1
Kushagra Mehta
Kushagra Mehta

Posted on • Updated on

From Zero to Hero (▀̿Ĺ̯▀̿ ̿) in Authentication | Part 1

Authentication

First focus on "WHAT".

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

OKAY.🤨! But it is kinda hard for me. Let's understand with a simple example. For example, you're Sheldon Cooper you go to the bank to withdraw money. You say to the cashier give me $5000, they were like "Who are you?? I don't know you so I can't". This happens because they don't know you, to identify you as a real holder of your bank account. They provided you a bank account number and pin/signature to identify you. When you give these details to the cashier, he will like "Thank you! Mr. Cooper, here is your $5000". So this shows that by giving the details it identifies you as the real holder of the bank account. So the process or action of verifying the identity of a user or process is Authentication.
Security

Types of Authentication

  1. Stateful
    • Cookie/Session Based Auth.
  2. Stateless
    • Basic Auth
    • JWT
    • OpenID Connect

Stateful Authentication

Cookie
Stateful Authentication is a way to verify users by having the server or backend store much of the session information, such as user properties.
In this method whenever a client requests to the server, the request carries the unique-id provided by the server at the authentication time and this ID is matched against its identity provider (IdP).
Stateful authentication is also called session-based authentication or cookie-based authentication for the session information the server must store on the user.

Advantages

  • Revoke the session anytime.
  • Easy to implement and manage.

Disadvantages

  • Increasing server overhead: As the number of logged-in users increases, the more server resources are occupied.
  • Server has to store the session id which limits scalability.

Stateless Authentication

Token-based
Stateless authentication is a way to verify a user by storing its data on the client-side and signing it with some cryptographic signature. This signed data is known as a token. Whenever a client tries to request the server, the server verifies the signed token, check if the token is valid or not.

Advantages

  • Easy to scale
  • Lower server overhead: Server does not have to allocate resources to the client.

Disadvantages

  • Cannot revoke the session anytime: As token is stored at client side, server does not have any rights to delete the session.
  • Relatively complex to implement: It increases the technical complexity while implementing.
  • If a token gets steal before expiring and a hacker uses it, the server has no way to identify it. That's why token's expiry time should be less(<=15min). Man-In-Middle
Stateful Stateless
Session information could be stolen ✅ It is impossible to steal session information from the session identifier because it is just an identifier associated with the session ❌ Session identifier contains all authentication information and it is possible to steal sensitive information, it is not encrypted.
Resource consuming ✅ When retrieving session information, service always gets access to session storage which causes additional resource consumption. ❌ The session identifier contains all session information.
Easy to implement ✅When session information stored in an external database, there is a need to implement session database persistence ❌Session identifier contains all session information, there is no need to implement additional functionality
Easy to scale ❌While adding new instances, there is a need to implement additional scale to session storage as well ✅Adding new service instances does not require additional effort
Authentication token size 🤏It is just an identifier, So size is small 🥵 It contains a large amount of data, the authentication token also becomes large
Restrict access among different parts of an application ✅It is possible to configure the system so different parts of the system will only have access to the data necessary for their work ❌All parts of the system have access to all session data
Possibility to revoke session ✅It is possible to revoke a session at any time ❌Since the session token contains an expiration date, it is impossible to revoke the authentication session

Conclusion

Both approaches make sense, both have their advantages and disadvantages. Stateless authentication easier to implement and scale, but stateful authentication is more secure and easier to manage. In the next part, we'll understand each way of authentication like JWT, Cookie, OAuth, Etc. 👋🏻
Bye

Bibliography

Top comments (16)

Collapse
 
sarafian profile image
Alex Sarafian

Unfortunately authentication is a word often misused.

Authentication is about confirming that you are you say you are and authorization is about knowing what you can do.

Because we use different means to implement and optimize this, we usually end up using tokens or cookies. They get validated to then allow the authorization to happen. But they are not part of the authentication flow.

But I can understand why they are collapsed together because the tools give you that perception.

How it helps you understand better the flow at least on the theoretical level.

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

Yes, you are right Authentication and Authorization can sometimes be confusing. That's why I'm writing this series to explain What, and various part of Authentication.

If we want to understand Authentication and Authorization in simple terms, Authentication is validating/identifying that is the user is correct or not and Authorization is giving users rights/privileges to use resources.

For example, You go to the cinema hall to watch a movie, while entering guard check your ticket and authenticate that you pay for the ticket or not. Ok, now while roaming around you see VIP lounge but you are not authorized to go there. But if you are a good friend of the owner and he Authorize you to go to the VIP room then that is authorization.

Collapse
 
sarafian profile image
Alex Sarafian

That's why I tried to expand.

In real life it is not always to map this for various reasons.

But let's say you have an identity card and you give to a clerk in the town hall. Only card(token) validation happens. It is actually much more complicated because you are in context of federation. But I don't want to confuse you. In any case, authentication happened once when the card was issued. I'm referring to countries where the card is electronic.

Thread Thread
 
kushagra_mehta profile image
Kushagra Mehta

Yes, you explained it very well. Only the initial step is authentication after that everything is authorization till the ID gets expires. Session-ID stored in Cookie or JWT Token is just an authorization ID provided by the server which allows us to perform various functions on server resources. But on the initial steps, I have categorized stateful, stateless and everything else.

Collapse
 
dylanwatsonsoftware profile image
Dylan Watson • Edited

I'm not convinced this is a fair assessment of the two.

  1. Session information could be stolen: Don't store sensitive things in your token.
  2. Resource consuming: What extra information are you storing in the token for stateless that is "resource consuming"?
  3. Stateless is perhaps more involved, though both should be managed by libraries anyway.
  4. True
  5. Authentication token is slightly bigger but you shouldn't really need to store much in it.
  6. You most definitely can and should restrict certain parts of your system to different roles no matter the mechanism you use (not sure if that's what you meant)
  7. Stateless definitely makes it difficult to revoke tokens
Collapse
 
gjeotech profile image
gjeo@inten

Nice one. I did a research on something related to this last year . good work

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

Thank you 😁

Collapse
 
yellow profile image
Nam Nam

Useful post, but in the comparison section between stateful and stateless Authentication I saw that you've used the wrong icon with the reference page, easily confused for reader.

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

Thanks, I'll correct it. 😅

Collapse
 
jaladhsinghal profile image
Jaladh Singhal

Excellently written - thanks for explaining it in simple words! 👏

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

😁

Collapse
 
dev_emmy profile image
nshimiye_emmy

Great work thanks!

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

Thanks☺

Collapse
 
ozh profile image
྅༻ Ǭɀħ ༄༆ཉ

The stateful / stateless description makes sense, but why mention JWT, OpenID and so on in the intro if you're not going to explain what that is ?

Collapse
 
kushagra_mehta profile image
Kushagra Mehta

Zero to Hero is a series of posts. If you're intrested in sub-classification you can read Part 2. In part 3 I'm going to implement JWT

Collapse
 
mukul_singhal profile image
Mukul Singhal

Great Work 😁