Question

In: Computer Science

Research and write a report summarizing the different options available for authorization or authentication in Spark,...

Research and write a report summarizing the different options available for authorization or authentication in Spark, that is, how is data protected from inadvertent and/or unauthorized access. Your report should be no less than 1.000 words, not including references and citations.

Solutions

Expert Solution

Different Types of Authentication in Spark:

JSON Web Token(JWT): JWT comprises of 3 parts i.e., Header, Payload and Signature

Header contains 2 parts the token type and the hashing algorithm. Payload contains all the data we want to transmit, and Signature consists of header and payload in encoded form appended with a secret key. A combination of these 3 generates the JWT token.

Whenever a User makes a login request with their credentials the server verifies and sends back a token containing token containing identity of the user which is later stored on the client system and that allows the user inside the application.

Now when a user wants to access a resource the token is added to the authorization header and send to the server. The server then checks the token and lets him or her access the resource if it matches.

There are 2 JWT interfaces in Spark Jwt\GeneratorInterface and Jwt\ParserInterface which generates and parses tokens respectively.

Authentication Handler: It is a middleware that co-ordinates the authentication process. It consists of Token, Credential, Adapter and Request Filter.

Firstly, the Tokens are accepted and decoded for validation from the application sending the request. Then credentials check for the correct username and password of the user that comes along with the request trying to access it.

Then tokens are generated based upon existing tokens for a user or new tokens for an existing user.

If they don’t match then an exception is thrown.

Incase if no value is specified for authentication then Request Filter will come into play and authenticate all the existing users.


Related Solutions

This is a graduate course and students will be expected to research and write papers summarizing...
This is a graduate course and students will be expected to research and write papers summarizing in their own words what they have found on current topics from the weekly readings. Research is a theoretical review of relevant literature and application of findings in the literature to a topic related to a specific industry, field, or business problem. The research must be conducted using peer-reviewed trade or academic journals. While Blogs, Wikipedia, encyclopedias, course textbooks, popular magazines, newspaper articles, online...
Read the NY Fed's section and write a memo summarizing the details of the report. Summary...
Read the NY Fed's section and write a memo summarizing the details of the report. Summary of Economic Activity Economic activity in the Second District continued to grow at a moderate pace in the latest reporting period, and the labor market has remained tight. Input prices increased at a slightly faster pace, while selling prices continued to rise modestly. Fairly robust growth was reported in most service and distribution industries. Manufacturers reported that growth has slowed somewhat from its rapid...
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What...
Write a research project on Biometrics Authentication. What are the security challenges and privacy implications. What are the technologies used for biometrics authentication?
DISCUSS COMPARING TEXT EDITORS IN LINUX. Research the different text editors available in Linux and write...
DISCUSS COMPARING TEXT EDITORS IN LINUX. Research the different text editors available in Linux and write up a comparison of each. Your comparison should include a recommendation as to the editor you feel would be most useful and why.
Write a detailed research report on GEARBOXES
Write a detailed research report on GEARBOXES
Research relationship between contracts and promises, and write, 1) summarizing whether you believe that contracts are...
Research relationship between contracts and promises, and write, 1) summarizing whether you believe that contracts are promises; 2) analyzing whether and why contracts and promises should be treated the same or differently; and 3) in your analysis, consider the potential economic, legal, and moral consequences of your answers. You may wish to review this article along with other resources from Westlaw or JSTOR before beginning to write your answer.
       Define market segmentation and discuss the different options available to financial services organisations in deciding...
       Define market segmentation and discuss the different options available to financial services organisations in deciding on the bases to use in segmenting the personal sector.
IT IS A RESEARCH I Need a Unique Answers please . Write a report on the...
IT IS A RESEARCH I Need a Unique Answers please . Write a report on the below points 1. HR Strategies in Air Arabia Airline UAE (200 words) 2. Ethical Standard in Air Arabia Airline UAE (150 words) 3. HR Strategies impact on organizational performance (Air Arabia) UAE (200 words) 4. HR strategies promoting good practices at workplace (200 words) . Note: Plagiarism is strictly prohibited please do not copy from internet this s a research report not a case
Research and discuss prevention treatments options available for heart disease (site using APA and add references...
Research and discuss prevention treatments options available for heart disease (site using APA and add references when needed) - Describe the common primary, secondary and tertiary prevention strategies for heart disease - Describe common treatments used on individuals as heart disease progresses and determine which may be appropriate for informing public heath strategies - Illustrate how the identified prevention and treatment options might be able to inform future strategies aimed at improving public health. Support your discussion with specific examples.  
) Undertake research; find out what options are available to digitally sign master files before storage....
) Undertake research; find out what options are available to digitally sign master files before storage. Write a 1 to 2 page report in which you set out your findings including the benefits of digital signatures and the procedures which can be used to create them
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT