<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing REST API in NSO Developer Hub Discussions</title>
    <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3728837#M2771</link>
    <description>&lt;P&gt;No, but you can run the REST api over HTTPS for encryption. You&amp;nbsp;enable this under&amp;nbsp;ssl in the webui part of ncs.conf.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Oct 2018 18:37:49 GMT</pubDate>
    <dc:creator>vleijon</dc:creator>
    <dc:date>2018-10-19T18:37:49Z</dc:date>
    <item>
      <title>Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726307#M2747</link>
      <description>&lt;P&gt;Aside from the password, what other methods are used to secure NSO's REST API?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 13:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726307#M2747</guid>
      <dc:creator>ron.whitt</dc:creator>
      <dc:date>2018-10-16T13:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726495#M2748</link>
      <description>&lt;P&gt;Hi Ron,&lt;/P&gt;
&lt;P&gt;It is now a best practice to start using RESTCONF API instead of the legacy pre-standard-REST as a lot of new features are only available in RESTCONF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Particularly, for RESTCONF you can support token-based authentication (see attached output from "man ncs.conf"). However, this is not well documented yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just in case you were thinking about it, NSO does not support client-certificate based authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Roque&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/ncs-config/restconf/token-response&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When authenticating via AAA external-authentication or external-validation and a token is returned,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; it is possible to include a header with the token in the response.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /ncs-config/restconf/token-response/x-auth-token (boolean) [false]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Either 'true' or 'false'. If 'true', a x-auth-token header is included in the response with any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; token returned from AAA.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /ncs-config/restconf/token-response/token-cookie&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configuration of RESTCONF token cookies.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /ncs-config/restconf/token-response/token-cookie/name (string) []&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The cookie name, exactly as it is to be sent. If configured, a HTTP cookie with that name is&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; included in the response with any token returned from AAA as value.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /ncs-config/restconf/token-response/token-cookie/directives (string) []&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; An optional string with directives appended to the cookie, exactly as it is to be sent.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 17:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726495#M2748</guid>
      <dc:creator>rogaglia</dc:creator>
      <dc:date>2018-10-16T17:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726498#M2749</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found token authentication documentation in the Administrator Guide, chapter 9: "The AAA infrastructure".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Roque&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 17:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726498#M2749</guid>
      <dc:creator>rogaglia</dc:creator>
      <dc:date>2018-10-16T17:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726544#M2752</link>
      <description>&lt;P&gt;So does this token method provide any encryption?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 19:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3726544#M2752</guid>
      <dc:creator>ron.whitt</dc:creator>
      <dc:date>2018-10-16T19:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3728837#M2771</link>
      <description>&lt;P&gt;No, but you can run the REST api over HTTPS for encryption. You&amp;nbsp;enable this under&amp;nbsp;ssl in the webui part of ncs.conf.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Oct 2018 18:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3728837#M2771</guid>
      <dc:creator>vleijon</dc:creator>
      <dc:date>2018-10-19T18:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3729793#M2777</link>
      <description>Thanks so much for the reply, yes this is the answer we were looking for.  I'm getting good traction for NSO in the global financial space so I'm bound to run into many more security related questions.</description>
      <pubDate>Mon, 22 Oct 2018 13:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3729793#M2777</guid>
      <dc:creator>ron.whitt</dc:creator>
      <dc:date>2018-10-22T13:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: Securing REST API</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3729794#M2778</link>
      <description>&lt;P&gt;Your answer is on RFC8040, section 2.2:&lt;/P&gt;
&lt;H3&gt;&lt;A class="selflink" href="https://tools.ietf.org/html/rfc8040#section-2.2" name="section-2.2" target="_blank"&gt;2.2&lt;/A&gt;. HTTPS with X.509v3 Certificates&lt;/H3&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;PRE class="newpage"&gt;   Given the nearly ubiquitous support for HTTP over TLS [&lt;A title="&amp;quot;Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing&amp;quot;" href="https://tools.ietf.org/html/rfc7230" target="_blank"&gt;RFC7230&lt;/A&gt;],
   RESTCONF implementations MUST support the "https" URI scheme, which
   has the IANA-assigned default port 443.

   RESTCONF servers MUST present an X.509v3-based certificate when
   establishing a TLS connection with a RESTCONF client.  The use of
   X.509v3-based certificates is consistent with NETCONF over TLS
   [&lt;A title="&amp;quot;Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication&amp;quot;" href="https://tools.ietf.org/html/rfc7589" target="_blank"&gt;RFC7589&lt;/A&gt;].&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTTS is mandatory for RESTCONF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Roque&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 13:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/securing-rest-api/m-p/3729794#M2778</guid>
      <dc:creator>rogaglia</dc:creator>
      <dc:date>2018-10-22T13:23:25Z</dc:date>
    </item>
  </channel>
</rss>

