The Web Application variant of Trust Tag is well suited for access control of web applications. In this interactive guide we have used a combination of Database Policy Authority and Phone Authentication to demonstrate web application access control through Trust Tag. This interactive guide is available to users who have created an account on Resilient Access. The Database Policy Authority extracts the name and phone number entered during user registration and passes the name as an identity attribute to this WordPress application and performs a Phone Authentication using the phone number.
Access Web Application Trust Tag consists of a few server side scripts that are available as a plugin for a web application. By adding a single line of code in the main template/layout file of the web application, access to the application controlled through the policy defined in Resilient Access. The steps for integration with your web application are as follows:
- Create the policy you wish to enforce in Resilient Access, you must specify a valid hostname where the web application will be hosted, e.g. https://example.com. Select the Access Web Application tab and then select the Web Application Technology your web app is built using and the name of the web application (context path). Enter “/” if the web application will be installed in the root context.
- In the policy list page click on the icon in the Policy Used For section, the following popup will be displayed:
- Click on the Download Plugin to Enforce Policy in Application button to download the plugin ZIP file.
- Extract the plugin ZIP into the root directory of the web application
- In the main template/layout file of the web application enter a single server side include statement at the top of the page to enforce the policy for the web application. e.g
<?php include 'rns/enforcePolicy.php';?>For JSP:
<%@include file="rns/enforcePolicy.jsp"%>For Python:
from rns import enforcePolicy
Access Web Application Trust Tag uses a cookie to keep track of policy evaluation context and the parameters for the policy. This cookie is created in your applications domain and is named as follows: RNS.<app name>.Policy. The expiration of the cookie is set to the value specified for Access expires in field while creating policy. The policy will be enforced again when the expiration time is reached.
The plugin consists of the following four server scripts:
- login: The only content in this file is the Trust Tag script tag embedded in <head> section. The policy evaluation UI is rendered in this page. If you wish to render your applications header/footer or other widgets during policy evaluation you may edit this file.
- postCredential: This script will be invoked by Trust Tag when the policy evaluation is successful. This script received policy evaluation context information. The script creates the cookie and places the context information in it.
- logout: Called when the Logout button is clicked. It removed the Trust Tag cookie and closes the Trust Network session and redirects to the home page of the application which will again redirect to the login page through the enforcePolicy script
-- Download Access Web Application as PDF --