How to handle file downloads with JWT based authentication?
Asked Answered
B

5

169

I'm writing a webapp in Angular where authentication is handled by a JWT token, meaning that every request has an "Authentication" header with all the necessary information.

This works nicely for REST calls, but I don't understand how I should handle download links for files hosted on the backend (the files reside on the same server where the webservices are hosted).

I can't use regular <a href='...'/> links since they won't carry any header and the authentication will fail. Same for the various incantations of window.open(...).

Some solutions I thought of:

  1. Generate a temporary unsecured download link on the server
  2. Pass the authentication information as an url parameter and manually handle the case
  3. Get the data through XHR and save the file client side.

All of the above are less than satisfactory.

1 is the solution I am using right now. I don't like it for two reasons: first it is not ideal security-wise, second it works but it requires quite a lot of work especially on the server: to download something I need to call a service that generates a new "random" url, stores it somewhere (possibly on the DB) for a some time, and returns it to the client. The client gets the url, and use window.open or similar with it. When requested, the new url should check if it is still valid, and then return the data.

2 seems at least as much work.

3 seems a lot of work, even using available libraries, and lot of potential issues. (I would need to provide my own download status bar, load the whole file in memory and then ask the user to save the file locally).

The task seems a pretty basic one though, so I'm wondering if there is anything much simpler that I can use.

I'm not necessarily looking for a solution "the Angular way". Regular Javascript would be fine.

Bahaism answered 4/4, 2015 at 22:21 Comment(3)
By remote do you mean that the downloadable files are on a different domain than the Angular app? Do you control the remote (have access to modify it's backend) or not?Chard
I mean that the file data is not on the client (browser); the file is hosted on the same domain and I have control of the backend. I will update the question to make it less ambiguous.Bahaism
The difficulty of option 2 is dependent on your backend. If you can tell your backend to check the query string in addition the the authorization header for the JWT when it goes through the authentication layer, you're done. Which backend are you using?Jetta
J
80

Here's a way to download it on the client using the download attribute, the fetch API, and URL.createObjectURL. You would fetch the file using your JWT, convert the payload into a blob, put the blob into an objectURL, set the source of an anchor tag to that objectURL, and click that objectURL in javascript.

let anchor = document.createElement("a");
document.body.appendChild(anchor);
let file = 'https://www.example.com/some-file.pdf';

let headers = new Headers();
headers.append('Authorization', 'Bearer MY-TOKEN');

fetch(file, { headers })
    .then(response => response.blob())
    .then(blobby => {
        let objectUrl = window.URL.createObjectURL(blobby);

        anchor.href = objectUrl;
        anchor.download = 'some-file.pdf';
        anchor.click();

        window.URL.revokeObjectURL(objectUrl);
    });

The value of the download attribute will be the eventual file name. If desired, you can mine an intended filename out of the content disposition response header as described in other answers.

Jetta answered 31/3, 2017 at 5:34 Comment(12)
I keep wondering why no one considers this response. It's simple and since we're living in 2017, the platform support is fairly good.Gretel
But iosSafari support for the download attribute looks pretty red :(Sibell
what if the filename doesn't have any extension? .txt is always appended, which is not the desired behavior.Wraparound
This worked fine for me in chrome. For firefox it worked after I added the anchor to the document: document.body.appendChild(anchor); Did not find any solution for Edge...Ephesians
This solution works but does this solution handle UX concerns with large files? If I need to sometimes download a 300MB file it could take some time to download before clicking the link and sending it to the brower's download manager. We could spend the effort use the fetch-progress api and build out our own download progress UI.. but then there's also the questionable practice of loading a 300mb file into js-land (in memory?) to merely hand it off to the download manager.Outfoot
@Outfoot I would support putting the id_token as a query string parameter in addition to the authorization header in that case so you can have the browser manage the download. That's actually what we did.Jetta
@Ephesians i too could not make this work for Edge and IETother
I have tested it on Edge Version 87.0.664.60 (Official build) (64-bit) and it works!. Regarding downloading large files, from UX point of view we see the download after a delay. What happens during this delay ? But what about the memory consuption at the browser level ?Colis
@IdaAmit Because basically, you are creating a very heavy HTML element for the current page. That's the reason why you see a delay. Think about if the user downloads from mobile devices, the delay can be over a minute.Zindman
It works, I can pass the token to the request. But do you have any idea to make browser open the download url in a new tab?Nonjuror
shouldn't it be anchor.download = file ?Matchmark
This answer should be edited to clearly state that the download will NOT be managed by the browser, which leads to unexpected behavior (from the standpoint of a junior engineer).Matchmark
F
58

Technique

Based on this advice of Matias Woloski from Auth0, known JWT evangelist, I solved it by generating a signed request with Hawk.

Quoting Woloski:

The way you solve this is by generating a signed request like AWS does, for example.

Here you have an example of this technique, used for activation links.

backend

I created an API to sign my download urls:

Request:

POST /api/sign
Content-Type: application/json
Authorization: Bearer...
{"url": "https://path.to/protected.file"}

Response:

{"url": "https://path.to/protected.file?bewit=NTUzMDYzZTQ2NDYxNzQwMGFlMDMwMDAwXDE0NTU2MzU5OThcZDBIeEplRHJLVVFRWTY0OWFFZUVEaGpMOWJlVTk2czA0cmN6UU4zZndTOD1c"}

With a signed URL, we can get the file

Request:

GET https://path.to/protected.file?bewit=NTUzMDYzZTQ2NDYxNzQwMGFlMDMwMDAwXDE0NTU2MzU5OThcZDBIeEplRHJLVVFRWTY0OWFFZUVEaGpMOWJlVTk2czA0cmN6UU4zZndTOD1c

Response:

Content-Type: multipart/mixed; charset="UTF-8"
Content-Disposition': attachment; filename=protected.file
{BLOB}

frontend (by jojoyuji)

This way you can do it all on a single user click:

function clickedOnDownloadButton() {

  postToSignWithAuthorizationHeader({
    url: 'https://path.to/protected.file'
  }).then(function(signed) {
    window.location = signed.url;
  });

}
Flatto answered 17/2, 2016 at 0:11 Comment(13)
This is cool but I don't understand how it's different, from a security perspective, than the OP's option #2 (token as query string parameter). Actually, I can imagine that the signed request could be more restrictive, i.e. just allowed to access a particular endpoint. But the OP's #2 seems easier / fewer steps, what's wrong with that?Imelda
Depending on your web server the full URL might get logged in its log files. You might not want your IT people having access to all the tokens.Flatto
Additionally the URL with the query string would be saved in your user's history, allowing other users of the same machine to access the URL.Flatto
Finally and what makes this very insecure is, the URL is sent in the Referer header of all requests for any resource, even third party resources. So if your using Google Analytics for example, you will send Google the URL token in and all to them.Flatto
This text was taken from here: #643855Flatto
in my implementations of the web api for this pattern, the signed.url is only good for 1 accessMicrocrystalline
link to the "advice" doesn't seem to work, or it redirects to some other pageLentil
Great solution and the best IMHO! If you're not using Hapi, you might want to try this small lib for signing URLs: github.com/smbwain/signedRomine
I guess this is safe when the signed URL is for one-time only.Zindman
Thank you @mohitesachin217. I fixed it using the Web Archive Wayback Machine.Flatto
I think it would be nice if the comments regarding why Ezequias' approach is better and more secure should be in the post itself, rather than in the comment section.Matchmark
@EzequiasDinella You wrote "Finally and what makes this very insecure is", by this you're seemingly referring to your own post, stating that your provided solution is very insecure. I suggest improving the comment and move the information into the post.Matchmark
This approach still leaves the URL in browser history (tested firefox 124.0.1 (64-bit)). I don't see a difference to the general URL presigning URL technique.Matchmark
D
46

An alternative to the existing "fetch/createObjectURL" and "download-token" approaches already mentioned is a standard Form POST that targets a new window. Once the browser reads the attachment header on the server response, it will close the new tab and begin the download. This same approach also happens to work nicely for displaying a resource like a PDF in a new tab.

This has better support for older browsers and avoids having to manage a new type of token. This will also have better long-term support than basic auth on the URL, since support for username/password on the url is being removed by browsers.

On the client-side we use target="_blank" to avoid navigation even in failure cases, which is particularly important for SPAs (single page apps).

The major caveat is that the server-side JWT validation has to get the token from the POST data and not from the header. If your framework manages access to route handlers automatically using the Authentication header, you may need to mark your handler as unauthenticated/anonymous so that you can manually validate the JWT to ensure proper authorization.

The form can be dynamically created and immediately destroyed so that it is properly cleaned up (note: this can be done in plain JS, but JQuery is used here for clarity) -

function DownloadWithJwtViaFormPost(url, id, token) {
    var jwtInput = $('<input type="hidden" name="jwtToken">').val(token);
    var idInput = $('<input type="hidden" name="id">').val(id);
    $('<form method="post" target="_blank"></form>')
                .attr("action", url)
                .append(jwtInput)
                .append(idInput)
                .appendTo('body')
                .submit()
                .remove();
}

Just add any extra data you need to submit as hidden inputs and make sure they are appended to the form.

Detour answered 16/12, 2019 at 19:46 Comment(6)
I believe this solution is greatly undervoted. It's easy, clean, and works perfectly.Lakisha
This solution works the only concern I have is from security point of view. The service might be attach by huge amount of calls , although they all have invalid jwt token. It makes the service busy.Colis
@IdaAmit I can appreciate your concern. As long as JWT validation is the first thing done, I'm not sure how this is more exposed to a DoS attack than any of the previously mentioned approaches, all of which have to validate a JWT token to download (or to get a download token). Although there are differences between server technologies, usually a public route is fairly light-weight. As long as the same validation code is used, the difference in overhead should be minimal. Just because a framework hides the JWT validation code doesn't mean it won't have that overhead.Detour
What if access_token is expired for download file request? How are you going to refresh access_token?Zindman
@Zindman The lifetime of the token is the same as the rest of your application. For example, if you let your access_token expire and then try to access some other resource such as a list of items, you will also have similar issues. Usually one will use a refresh_token to periodically request a fresh access_token, but that depends on your application and is not specific to this scenario. You could use the expiration information to check if the JWT is still valid before doing the post, but again, that's a design choice that's well outside the scope of this question.Detour
Thanks! I can confirm that this works... moreover since I use flask-praetorian for server-side JWT validation I've went ahead and forked it adding automatic support for this feature (i.e. taking a token from a POST param). This example would work as-is provided the correct token and using my fork, which can be added to a requirements.txt file using this line (a PR was also opened): github.com/shaioz/flask-praetorian@master#egg=flask-praetorian (NOTE: add git+https:// to start of line, this does not format well inside this github comment)Aphorism
B
9

Pure JS version of James' answer

function downloadFile (url, token) {
    let form = document.createElement('form')
    form.method = 'post'
    form.target = '_blank'
    form.action = url
    form.innerHTML = '<input type="hidden" name="jwtToken" value="' + token + '">'

    console.log('form:', form)

    document.body.appendChild(form)
    form.submit()
    document.body.removeChild(form)
}
Benyamin answered 6/2, 2021 at 15:43 Comment(1)
Thanks this is working for me! please see #29452531 for a flask-praetorian fork that supports this at the server side automatically (a PR was created also).Aphorism
C
8

I would generate tokens for download.

Within angular make an authenticated request to obtain a temporary token (say an hour) then add it to the url as a get parameter. This way you can download files in any way you like (window.open ...)

Choosey answered 19/4, 2015 at 7:31 Comment(4)
This is the solution I'm using for now, but I'm not satisfied with it because it's quite a lot of work and I'm hoping there is a better solution "out there" ...Bahaism
I think this is the cleanest solution available and i can't see a lot of work there. But I would either choose a smaller validity time of token (e.g. 3 minutes) or make it a one-time-token by keeping a list of the tokens on the server and delete used tokens (not accepting tokens that aren't on my list).Sorbose
I have a binary (static file) to be protected this manner. Can I host this static file in Webserver and access it with the JWT ? In such case, what happens if user tries to hit the file URL without the JWT ?Prim
@Prim the downside to this aproach is that if you do a window.open or a direct link to the file, you cant pass the jwt token as header.Choosey

© 2022 - 2024 — McMap. All rights reserved.