I just had a crazy thought, in connection with a situation in which we're trying to figure out a way to limit web service connections to authorized consumers.

Here's the situation: we have both a browser-based UI (for which we definitely do NOT want to require users to have client-side certificates installed in their browsers), and a series of web services (for which we want to be able to restrict any given user-ID and password to consumer-side hardware authorized for that given user-ID and password).

For situations in which a given customer's users are calling the services from their own hardware, at their own IP address, that's not a problem. For situations in which the web services are being consumed by *a specific* cloud server with *a specific, permanent, IP address*, it's not a problem: either way, we can simply authorize that IP address for that customer's user-IDs.

But what if the services are being consumed by a cloud server that's part of a managed, load-balanced, instance group? I know empirically that such a box, at least if it's a Google Compute instance, calls the services from its own external IP address.

Could it be done with something involving presentation of the public key of a certificate, without forcing browsers accessing the UI to also do so?

Anybody have any suggestions?

--
JHHL

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to