最新消息:雨落星辰是一个专注网站SEO优化、网站SEO诊断、搜索引擎研究、网络营销推广、网站策划运营及站长类的自媒体原创博客

javascript - Proper way to secure content in React Route with Authentication? - Stack Overflow

programmeradmin1浏览0评论

I'm trying to setup a protected route (homepage in my case) with React. It works fine on the client. If not authenticated by server, it reroutes to login page. But technically, unauthenticated users can still check out the static content on the protected route (though of course the api calls to server are safe), just by either sifting through code, or by setting state in dev tools. I don't like this.

TLDR question: How can I make sure even the static content in protected routes are not seen by unauthenticated users?

I understand that authentication has to move from client to the server. But what is the proper way to do this with React/React Router?

My ideas:

-Serve an unauthenticated react app/index.html for just Login. When authenticated, serve another app for user content/pages.

-Maybe it's possible to do some ponent lazy loading from the server that also checks authentication on the request?

My context: create-react-app, express/node backend, using okta auth.

Thank you.

I'm trying to setup a protected route (homepage in my case) with React. It works fine on the client. If not authenticated by server, it reroutes to login page. But technically, unauthenticated users can still check out the static content on the protected route (though of course the api calls to server are safe), just by either sifting through code, or by setting state in dev tools. I don't like this.

TLDR question: How can I make sure even the static content in protected routes are not seen by unauthenticated users?

I understand that authentication has to move from client to the server. But what is the proper way to do this with React/React Router?

My ideas:

-Serve an unauthenticated react app/index.html for just Login. When authenticated, serve another app for user content/pages.

-Maybe it's possible to do some ponent lazy loading from the server that also checks authentication on the request?

My context: create-react-app, express/node backend, using okta auth.

Thank you.

Share Improve this question asked Jun 11, 2019 at 20:24 AlexAlex 1432 silver badges14 bronze badges 1
  • 1 You kind of hit all the right notes; the true way of safe-guarding your static resources is on the server. As far as not allowing front-end discovery of such files, what's the motivation? Are any of the static resources particularly sensitive? If so, should you go down the route of server-side auth on them? Essentially, I'm trying to dissuade you from doing "security by obscurity." Assume that the addresses to your static resources are known. Will anything bad happen? If so, auth against it on the server. – Arash Motamedi Commented Jun 11, 2019 at 20:35
Add a ment  | 

2 Answers 2

Reset to default 7

There are a couple of ways around this using a variety of methods.

First is to server-side render everything with a framework like Next.js. This framework is used by a ton of large enterprise panies because of the search engine friendliness of SSR pages. In your scenario though, it would solve your problem of showing content only when someone is authorized.

However, in most React.js apps, your data is ing from a data source such as MongoDB that is hidden behind your backend. The only code/information an unauthorized user would be able to see in your JS is the general layout of pages.

You can make hoc which will wrap your protected ponent and check if he is authenticated by a server. If not redirect him to homepage or somewhere else.

发布评论

评论列表(0)

  1. 暂无评论