Skip to content

Unity Security Use Cases

Galen Hollins edited this page May 13, 2022 · 16 revisions

Please use this page to determine which use case best applies to your particular security need. From this, you will be able to identify what technologies will be involved, and what adaptation code (if any) you will need to write.

App-to-App (service-to-service) Interaction.

In this case, there is a need to call/interact with one service endpoint, from another, in a non-human way.

For example, the "caller program" could be:

  • a Python program calling a REST API,
  • a Jupyter Notebook making a service call,
  • a web application backend service layer, calling a REST API,
  • a JavaScript API call from a UI page,
  • etc..

Service Area Implementation Requirements:

  • Must implement token refresh API calls in code
  • Must implement endpoint call in program(s)

The below diagram shows the high-level use case: Screen Shot 2022-05-12 at 1 19 22 PM

Human-to-UI Interaction.

In this case, a human user is access a web page such as:

  • HySDS UI
  • JupyterHub
  • or other web UI..

If the user doesn't already have a valid token, then they are required to log in via the Cognito login page, before accessing the target web page. Screen Shot 2022-05-13 at 9 48 20 AM

Reverse Proxy Interaction.

description coming soon. Screen Shot 2022-05-13 at 9 47 29 AM .