Security
Authorization Methods in Utexo Cloud
We prioritize the security of your interactions with nodes hosted on AWS through Cloud. To ensure robust protection, we provide two advanced methods of authorization for secure communication: Cognito Authorization and mTLS Authorization. These methods meet stringent security standards, safeguarding both user interactions via our interface
1. Cognito Authorization
Cognito Authorization is designed for users interacting with nodes through the Cloud UI. It ensures secure access and streamlined authentication for HTTPS requests.
Key Features:
Leverages Amazon Cognito to manage user identities.
Handles authentication and token issuance securely.
Allows users to perform authorized actions seamlessly via the Cloud user interface.
Use Case: Ideal for users accessing nodes through the Cloud UI for day-to-day operations and HTTPS API requests.
Benefits:
Centralized identity management.
Automated token handling for improved user experience.
Secure interaction with Cloud nodes.
2. mTLS Authorization
mTLS Authorization (Mutual TLS) is tailored for developers and advanced users who need to interact with nodes directly, such as through custom applications or third-party clients.
How it Works:
Both the client and server authenticate each other using TLS certificates.
Clients must present a valid certificate issued by a trusted Certificate Authority (CA).
Enforced via AWS API Gateway to ensure secure communications.
Key Features:
Mutual Authentication: Verifies the identity of both parties in the communication.
Certificate Management: Requires proper configuration of client certificates for secure API access.
Supports direct, high-security API interactions.
Use Case: Ideal for developers and applications requiring secure, direct communication with nodes outside of the Cloud UI.
Benefits:
Maximum security for API interactions.
Flexibility for integrating Cloud with custom-built solutions.
Trust-based access via Certificate Authority validation.
Last updated