Changes for page Multipart form-data
Last modified by Erik Bakker on 2024/06/17 11:39
From version 11.1
edited by Erik Bakker
on 2022/07/26 13:40
on 2022/07/26 13:40
Change comment:
There is no comment for this version
To version 20.1
edited by Erik Bakker
on 2022/08/05 14:50
on 2022/08/05 14:50
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 - API Gateway Security-External IDP1 +Multipart form-data - Content
-
... ... @@ -1,5 +1,5 @@ 1 1 {{container}}{{container layoutStyle="columns"}}((( 2 - InthecrashcourseontheAPI Gatewaywediscussed thevarious optionsavailableto[[secure>>doc:Main.eMagizAcademy.Microlearnings.CrashCourse.CrashCourseAPI Gateway.crashcourse-api-gateway-security.WebHome||target="blank"]]yourAPI Gatewayproperly. In this microlearning, we willexpandourknowledgeonthattopicby looking ata specialcaseof securingyourAPI Gateway. Thatcase is specialas youuseanexternalidentityprovider(IDP) togovernherolesandusersthat haverightsonyour API Gateway.2 +Sometimes when you call an external REST endpoint, they require you to send meta information and one or more "attachments" in one call to the REST endpoint. To make this possible, you need to send the information with the contentType called multipart/form-data. In this microlearning, we will discuss how you can configure a valid message within the eMagiz platform that allows you to send out messages with this contentType and have them accepted by the endpoint in question. 3 3 4 4 Should you have any questions, please get in touch with [[academy@emagiz.com>>mailto:academy@emagiz.com]]. 5 5 ... ... @@ -9,51 +9,73 @@ 9 9 10 10 == 2. Key concepts == 11 11 12 -This microlearning focuses on u sing anexternal IDPtovalidate whetherauseris authorizedtoexecuteacertainactiononyourAPI Gatewayand what configurationisneeded in eMagiztomakethis work.12 +This microlearning focuses on configuring a multipart/form-data message within eMagiz to ensure it is sent correctly to an endpoint. 13 13 14 -* The Token and Issuer URL of the external IDP need to be known 15 -* Users and Roles under User Management need to be manually configured and maintained to keep them in sync with the external IDP 14 +Key aspects are: 16 16 17 -== 3. External IDP == 16 +* Defining the boundary that separates the parts of the message 17 +* Defining the content types of each part of the message 18 +* Construction of the complete message according to the specification 18 18 19 - Inthe crash course on the API Gateway we discussed the various options available to [[secure>>doc:Main.eMagizAcademy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-security.WebHome||target="blank"]] your API Gateway properly. In this microlearning, we will expand ourknowledge onthattopic by looking at a special case ofsecuring yourAPI Gateway. That case is special as you use an external identity provider (IDP) to govern the rolesand usersthathave rights on your API Gateway.20 +== 3. Multipart form-data == 20 20 21 - Whenselectingthe optionOAuth2.0(orOpenIDConnect)youhave theoption tousetheIDPprovidedby eMagizwhichmakesthe configuration easyoryou coulduseanexternalIDPwhichyouhave control overandwanttouseforthispurposes.22 +Sometimes when you call an external REST endpoint, they require you to send meta information and one or more "attachments" in one call to the REST endpoint. To make this possible, you need to send the information with the contentType called multipart/form-data. In this microlearning, we will discuss how you can configure a valid message within the eMagiz platform that allows you to send out messages with this contentType and have them accepted by the endpoint in question. 22 22 23 - In this microlearning we will highlight whatyouneed to configure in Designand Deploy to makehiswork within thetooling of eMagiz.24 +Key aspects are: 24 24 25 -=== 3.1 Design === 26 +* Defining the boundary that separates the parts of the message 27 +* Defining the content types of each part of the message 28 +* Construction of the complete message according to the specification 26 26 27 - Onthesecurity level of the API Gateway in Design you need to select the desired option, for example OAuth2.0. Instead of not filling in the token and issuerURL, indicating that you want to use the eMagiz IDP, you need to fill these in to reference the IDP of your choice. Below youseean example of how this could be configured.30 +=== 3.1 Prepare the message === 28 28 29 - [[image:Main.Images.Microlearning.WebHome@expert-securing-data-traffic-api-gw-security-external-idp-security-config-design.png]]32 +To construct the message, several steps are needed to make it work. Luckily, most of the steps necessary have to do with concepts we have already discussed in previous microlearnings. As you can imagine, based on what multipart/form-data entails, we need a way to both store the meta information and the file(s) we want to send to the external party. For example, put the metadata in one (or multiple) header(s) and use the file content as a payload. This you can achieve with a header enricher and standard transformer. 30 30 31 - Note that theenvironmentIDin thisexampleshouldbereplacedwith an actualenvironmentIDthatreferences your environment.34 +Once the file content is your payload, you must ensure that the data is "raw." So when you have a base64 encoded string, you should decode it before sending it to the endpoint. 32 32 33 - ===3.2Deploy===36 +On top of that, we need to define the contentType header. 34 34 35 - Normally,eMagiz will automatically updatethe UserManagementinformation based on the configurationDesign.wever, becausethe identity check isnotdone by eMagiz but by an externaly you needo manuallyentertherolesandusers andconfigure the scope correctly onrole level.38 +[[image:Main.Images.Microlearning.WebHome@expert-data-handling-multipart-form-data--content-type-header-config.png]] 36 36 37 - Todosoavigate to User Managementin Deploy and add the users youwantmanually by pressingtheNew button and providing themwith a name. Dosubsequently the same for the roles. On role level do not forgetto correctly enter the scope to make the call work. Note that the help text on the scope level gently reminds you what you need to do to make this work.40 +=== 3.2 Construct the message === 38 38 39 - [[image:Main.Images.Microlearning.WebHome@expert-securing-data-traffic-api-gw-security-external-idp-scope-configuration.png]]42 +After you have set the stage, you can use a standard transformer component to build your message correctly. To create it correctly, you need to take the following into account: 40 40 41 -{{warning}}When implementing this you would be the first to do so with this setup. This means there might be some unexpected behavior when configuring this.{{/warning}} 44 +* Each part of the message needs to be separated by a boundary 45 +* The message needs to start with a boundary and finish with a boundary 46 +* Line breaks are needed to differentiate between the boundary and the text content 47 +* No line break is needed when the content is not text-based 42 42 49 +Given all this, you can write the following SpEL expression that will yield a desirable output: 50 + 51 +{{code}}'${multi-part-form-data.data-handling.boundary}' + headers.metaInfo + T(com.emagiz.util.Newline).CRLF.characters + '${multi-part-form-data.data-handling.boundary}' + T(com.emagiz.util.Newline).CRLF.characters + 'Content-Disposition: form-data; name="file"; filename="' + headers.filename + '"' + T(com.emagiz.util.Newline).CRLF.characters + 'Content-Type: application/pdf' + T(com.emagiz.util.Newline).CRLF.characters + T(com.emagiz.util.Newline).CRLF.characters + payload + '${multi-part-form-data.data-handling.boundary}'{{/code}} 52 + 53 +Putting this in a standard transformation gives you the following solution in the flow. 54 + 55 +[[image:Main.Images.Microlearning.WebHome@expert-data-handling-multipart-form-data--standard-transformer-config.png]] 56 + 57 +=== 3.3 Calling the endpoint === 58 + 59 +Now that we have constructed our message correctly, the last thing to do is call the endpoint in question. Since we have prepared our message and accurately defined our contentType calling the endpoint does not require any additional configurations compared to what you are already used to when dealing with REST endpoints. 60 + 43 43 == 4. Assignment == 44 44 45 -No assignment 63 +Try to see whether you can construct the flow so that it outputs a valid multipart/form-data message. 64 +This assignment can be completed with the help of the (Academy) project you created/used in the previous assignment. 46 46 47 47 == 5. Key takeaways == 48 48 49 -* The Token and Issuer URL of the external IDP need to be known 50 -* Users and Roles under User Management need to be manually configured and maintained to keep them in sync with the external IDP 51 -* When implementing this you would be the first to do so with this setup. 68 +* Make sure to define the boundary that separates the parts of the message 69 +* Make sure to define the content types of each part of the message 70 +* Make sure to define the content type that matches the specification for multipart/form-data 71 +* Construct the complete message according to the specification 52 52 53 53 == 6. Suggested Additional Readings == 54 54 55 -If you are interested in this topic and want more information, please read the help text providedbyeMagiz.75 +If you are interested in this topic, please read the help texts on the platform and read the following link: 56 56 77 +* https://www.sobyte.net/post/2021-12/learn-about-http-multipart-form-data/ 78 + 57 57 == 7. Silent demonstration video == 58 58 59 59 As this is more of theoretical microlearning, there is no video accompanying the microlearning.)))((({{toc/}}))){{/container}}{{/container}}