nextdeveloper / iam
NextDeveloper IAM Package, generated by NextDeveloper Generator.
Requires
- php: >=8.2.0
- beyondcode/laravel-websockets: *
- league/fractal: *
- monolog/monolog: *
Requires (Dev)
- illuminate/database: 5.5.*
- illuminate/support: 5.5.*
- illuminate/validation: 5.5.*
- dev-master
- v1.5.24
- v1.5.23
- v1.5.22
- v1.5.21
- v1.5.20
- v1.5.19
- v1.5.18
- v1.5.17
- v1.5.16
- v1.5.15
- v1.5.14
- v1.5.13
- v1.5.12
- v1.5.11
- v1.5.10
- v1.5.9
- v1.5.8
- v1.5.7
- v1.5.6
- v1.5.5
- v1.5.4
- v1.5.3
- v1.5.2
- v1.5.1
- v1.5.0
- v1.4.32
- v1.4.31
- v1.4.30
- v1.4.29
- v1.4.28
- v1.4.27
- v1.4.26
- v1.4.25
- v1.4.24
- v1.4.23
- v1.4.22
- v1.4.21
- v1.4.20
- v1.4.19
- v1.4.18
- v1.4.17
- v1.4.16
- v1.4.15
- v1.4.14
- v1.4.13
- v1.4.12
- v1.4.11
- v1.4.10
- v1.4.9
- v1.4.8
- v1.4.7
- v1.4.6
- v1.4.5
- v1.4.4
- v1.4.3
- v1.4.2
- v1.4.1
- v1.4.0
- v1.3.1
- v1.3.0
- v1.2.28
- v1.2.27
- v1.2.26
- v1.2.25
- v1.2.24
- v1.2.23
- v1.2.22
- v1.2.21
- v1.2.20
- v1.2.19
- v1.2.18
- v1.2.17
- v1.2.16
- v1.2.15
- v1.2.14
- v1.2.13
- v1.2.12
- v1.2.11
- v1.2.10
- v1.2.9
- v1.2.8
- v1.2.7
- v1.2.6
- v1.2.5
- v1.2.4
- v1.2.3
- v1.2.2
- v1.2.1
- v1.2.0
- v1.1.5
- v1.1.4
- v1.1.3
- v1.1.2
- v1.1.1
- v1.1.0
- v1.0.0
- v0.1
- dev-dev
- dev-222-we-should-block-users-to-changed-their-validated-profile-information
- dev-features/nin
- dev-features/helpers
This package is auto-updated.
Last update: 2024-11-20 07:42:08 UTC
README
This library provides an enterprise level basic identity and access management functionality. Functionalities here on this library is kept as simple as can be. The idea behind this library is for the developer to make it as complicated as they want.
Identity management software is a crucial tool in today's security-conscious digital environment. We will be adding these functionalities through time. Core functionalities of an identity management software usually include the following:
- User Provisioning: This feature enables administrators to create, modify, disable or delete user accounts and permissions across IT systems in a timely manner. This also includes account (or team) provisioning.
- Authentication: Authentication ensures that users are who they claim to be. This could include multi-factor authentication (MFA), biometric authentication, or password management.
-
- Password
-
- One Time Email (OTP)
-
- One Time SMS (OTP)
-
-
-
- Yahoo
-
- OpenID
-
- Microsoft
-
- Apple
-
- Github
-
- Gitlab
-
-
-
- Firebase
-
- OneAll
-
- OneLogin
-
- Okta
-
- Auth0
- Authorization: After verifying identity through authentication, the system determines what actions the user is allowed to perform, what files they can access, what resources they can use, etc.
- Single Sign-On (SSO): This feature allows users to log in once and gain access to a variety of applications, eliminating the need to remember multiple passwords.
- Federated Identity: This allows users to use the same credentials across different systems or even across different organizations.
- Directory Services: These services store, organize, and provide access to information about users and resources.
-
- LDAP
-
- Active Directory
- Role-Based Access Control (RBAC): This feature enables the assignment of access rights based on roles within the organization. For example, all employees in the marketing department could have similar access rights.
- Identity Governance: This includes tools for defining and implementing policies and rules for user access and for auditing and reporting on user access.
- Identity Lifecycle Management: This includes the processes for managing identities from the initial creation of the account, through various changes, to the eventual retirement of the account.
- Password Management: Tools for managing and resetting passwords, enforcing password policies, etc.
- Risk-Based Authentication (RBA): This feature uses machine learning to assess the risk level of user activities and adapt the authentication requirements accordingly.
- Integration with Other Systems: Identity management systems need to integrate with other systems, like HR systems, to automate the process of adding, changing, and removing users as employees join, move within, or leave the organization.
- 2FA implementations
-
- SMS one time code
-
- Email one time code
-
- Whatsapp one time code
-
- Telegram one time code
-
- Various push mechanisms for one time code
-
- Google Authenticator
-
- SMS
-
These functionalities provide a way for organizations to manage digital identities effectively, helping ensure security and compliance with data privacy regulations.
Authentication Mechanisms
In this library we try to support almost all available authentication mechanisms as well as a secure authorization mechanisms. For that we will be applying various standarts stated previously.
Password Management
For password management we are and will be applying various different practices to increase the security;
- using Argon2id for hashing passwords and scrypt for fallback.
- storing the old passwords to check if the user is not using the very same password
- checking the password quality, in terms of complexity
- rehashing passwords using rehash algorithms if available.
Notes to developers;
- Please take a good look at configuration file which is under the config folder.
- Please set the hashing algorithm, and please use argon2id or scrypt for fallback.
Notes for myself, and maybe you ?
- https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#argon2id
- https://wiki.php.net/rfc/argon2_password_hash
Token Management
We are producing tokens with JWT and Laravel Password implementation. However we are also creating different tokens to be able to login user with the client information and location information for enhanced security. That is why we are actually saving tokens with location, ip, client information (user-agent), JWT token and returning the user a hash of this data. When the user sends the token without "NDAuth" keyword instead of "Bearer" we understand that they are using our implementation of token management. In that case we go to JWT token database and look at the client information. If we think that the user is correct then we return the JWT token.
Transparent JWT token manipulation
When the user is sending the token that we generate instead of JWT token, we need to tell the application that the user is valid and its the user we are looking for. There are various ways to do this, including but not limited to database search, redis search or monipulation at load balancer or proxy level.
We implement application level lookup at the moment but we will be offering Load Balancer level of lookup for reduced cpu usage and overhead.
- Application lookup
- Load balancer lookup
Commercial Support
Please let us know if you need any commercial support. We dont have such a business plan but we will be happy to help you on your project and/or applying this library in your project
Want to contribute?
You are very welcome to contribute of course. Please send us an email so that we can get in touch and talk about details; codewithus@nextdeveloper.com