Use HTTPS π
Implement HTTPS to encrypt the communication between the client and server.
public class SecureApiController : ApiController
{
// Use attribute to enforce HTTPS
[RequireHttps]
public HttpResponseMessage GetSensitiveData()
{
// Fetch sensitive data logic
var sensitiveData = new { /* ... */ };
return Request.CreateResponse(HttpStatusCode.OK, sensitiveData);
}
}
// Custom attribute to enforce HTTPS
public class RequireHttpsAttribute : AuthorizationFilterAttribute
{
public override void OnAuthorization(HttpActionContext actionContext)
{
if (actionContext.Request.RequestUri.Scheme != Uri.UriSchemeHttps)
{
actionContext.Response = new HttpResponseMessage(System.Net.HttpStatusCode.Forbidden)
{
ReasonPhrase = "HTTPS Required"
};
}
else
{
base.OnAuthorization(actionContext);
}
}
}
Enforce HTTPS in the Startup.cs.
public void ConfigureServices(IServiceCollection services)
{
services.AddHttpsRedirection(options =>
{
options.RedirectStatusCode = StatusCodes.Status308PermanentRedirect;
options.HttpsPort = 443;
});
}
public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
{
app.UseHttpsRedirection();
}
Use OAuth2 π
Implement OAuth2, a protocol for authorization, to provide secure restricted access tokens to clients.
// OAuth2 configuration in Startup.cs
public void ConfigureAuth(IAppBuilder app)
{
// Configure the application for OAuth based flow
PublicClientId = "self";
OAuthOptions = new OAuthAuthorizationServerOptions
{
TokenEndpointPath = new PathString("/Token"),
Provider = new ApplicationOAuthProvider(PublicClientId),
AuthorizeEndpointPath = new PathString("/api/Account/Authorize"),
AccessTokenExpireTimeSpan = TimeSpan.FromDays(14),
// In production mode set AllowInsecureHttp = false
AllowInsecureHttp = true
};
// Enable the application to use bearer tokens to authenticate users
app.UseOAuthBearerTokens(OAuthOptions);
}
Implement the OAuth 2.0 authorization framework.
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddMicrosoftIdentityWebApi(Configuration, "AzureAd");
services.AddAuthorization(options =>
{
options.AddPolicy("RequireAdminRole", policy =>
{
policy.RequireRole("Admin");
});
});
Implementing JWT Authentication
services.AddAuthentication(JwtBearerDefaults.AuthenticationScheme)
.AddJwtBearer(options =>
{
options.TokenValidationParameters = new TokenValidationParameters
{
ValidateIssuer = true,
ValidateAudience = true,
ValidateLifetime = true,
ValidateIssuerSigningKey = true,
ValidIssuer = Configuration["Jwt:Issuer"],
ValidAudience = Configuration["Jwt:Issuer"],
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(Configuration["Jwt:Key"]))
};
});
Use Rate Limiting π¦
Use middleware to enforce rate limiting rules based on IP, user, or action group.
// Middleware for rate limiting
public class RateLimitingMiddleware : OwinMiddleware
{
public RateLimitingMiddleware(OwinMiddleware next) : base(next) { }
public override async Task Invoke(IOwinContext context)
{
if (RateLimitReached(context))
{
context.Response.StatusCode = (int)HttpStatusCode.TooManyRequests;
return;
}
await Next.Invoke(context);
}
private bool RateLimitReached(IOwinContext context)
{
// Implement your rate limiting logic here based on the context
// For instance, check the IP address and limit the number of requests per minute
return false;
}
}
Implement rate limiting to cap the number of requests a client can make in a given time window. You can define rate limits based on various factors like client IP, user ID, API route, etc.
public void ConfigureServices(IServiceCollection services)
{
services.AddOptions();
services.AddMemoryCache();
services.Configure<ClientRateLimitOptions>(options =>
{
options.GeneralRules = new List<RateLimitRule>
{
new RateLimitRule
{
Endpoint = "*",
Period = "1m",
Limit = 30,
}
};
});
services.AddSingleton<IClientPolicyStore, MemoryCacheClientPolicyStore>();
services.AddSingleton<IRateLimitCounterStore, MemoryCacheRateLimitCounterStore>();
}
public void Configure(IApplicationBuilder app)
{
app.UseClientRateLimiting();
}
Use API Versioning π
Implement versioning in your API routes to allow clients to specify the version they are designed to work with.
// Web API Route configuration
public static class WebApiConfig
{
public static void Register(HttpConfiguration config)
{
config.Routes.MapHttpRoute(
name: "VersionedApi",
routeTemplate: "api/v{version}/{controller}/{id}",
defaults: new { id = RouteParameter.Optional }
);
}
}
public class UsersController : ApiController
{
[HttpGet]
public string GetV1(int id)
{
// Version 1 specific processing
return "Data from version 1";
}
[HttpGet, Route("api/v2/users/{id}")]
public string GetV2(int id)
{
// Version 2 specific processing
return "Data from version 2";
}
}
Implement API versioning to maintain backwards compatibility. Include a version indicator (like βv1β) in the API route and optionally in the request/response headers.
services.AddApiVersioning(options =>
{
options.DefaultApiVersion = new ApiVersion(1, 0);
options.AssumeDefaultVersionWhenUnspecified = true;
options.ReportApiVersions = true;
options.ApiVersionReader = new UrlSegmentApiVersionReader();
});
[ApiVersion("1.0")]
[Route("api/v{version:apiVersion}/[controller]")]
public class UsersController : ControllerBase
{
// Controller implementation
}
Input Validation β
Use data annotations and the [ApiController] attribute for basic validations.
public class LoginModel
{
[Required]
[EmailAddress]
public string Email { get; set; }
[Required]
[StringLength(100, MinimumLength = 6)]
public string Password { get; set; }
}
[HttpPost("login")]
public IActionResult Login([FromBody] LoginModel model)
{
if (!ModelState.IsValid)
{
return BadRequest(ModelState);
}
// Authenticate user
}
Implement input validation at the API gateway level to ensure that only valid requests are processed.
public class ValidateModelAttribute : ActionFilterAttribute
{
public override void OnActionExecuting(HttpActionContext actionContext)
{
if (!actionContext.ModelState.IsValid)
{
actionContext.Response = actionContext.Request.CreateErrorResponse(
HttpStatusCode.BadRequest, actionContext.ModelState);
}
}
}
// Usage in a Controller
public class MyModel
{
[Required]
public string Property1 { get; set; }
// Other properties and validation attributes
}
public class MyApiController : ApiController
{
[ValidateModel]
public IHttpActionResult Post(MyModel model)
{
// Proceed knowing the model is valid
ProcessData(model);
return Ok();
}
private void ProcessData(MyModel model)
{
// Processing logic
}
}
Use Leveled API Keys ποΈ
Implement a system of leveled API keys with different access permissions. Each client gets their own unique key associated with specific roles or scopes.
public class ApiKey
{
public int Id { get; set; }
public string Key { get; set; }
public string ClientName { get; set; }
public List<string> Scopes { get; set; }
}
public class AuthorizationMiddleware
{
private readonly RequestDelegate _next;
public AuthorizationMiddleware(RequestDelegate next)
{
_next = next;
}
public async Task Invoke(HttpContext context, IApiKeyRepository apiKeyRepository)
{
string apiKey = context.Request.Headers["X-API-KEY"];
if (apiKey == null)
{
context.Response.StatusCode = 401;
await context.Response.WriteAsync("API key is missing.");
return;
}
ApiKey key = await apiKeyRepository.GetApiKey(apiKey);
if (key == null)
{
context.Response.StatusCode = 401;
await context.Response.WriteAsync("Invalid API key.");
return;
}
if (!key.Scopes.Contains(context.Request.Path.ToString()))
{
context.Response.StatusCode = 403;
await context.Response.WriteAsync("Not authorized to access this resource.");
return;
}
await _next(context);
}
}
Implement leveled API keys with varying access rights.
public class ApiKeyHandler : DelegatingHandler
{
protected override async Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
{
// Validate API key
if (!ValidateApiKey(request.Headers, out var apiKey))
{
return request.CreateResponse(HttpStatusCode.Forbidden, "Invalid API Key");
}
// Check access level of API key and set user's role
SetUserRoleBasedOnApiKey(apiKey);
// Continue down the pipeline
return await base.SendAsync(request, cancellationToken);
}
private bool ValidateApiKey(HttpRequestHeaders headers, out string apiKey)
{
// Logic to validate API key
apiKey = /* ... */;
return true;
}
private void SetUserRoleBasedOnApiKey(string apiKey)
{
// Logic to set user role based on API key level
}
}
Authorization π
Implement role-based access control (RBAC) and check user permissions on each API endpoint before allowing the request to proceed.
[Authorize(Roles = "Admin")]
[HttpDelete("users/{id}")]
public async Task<IActionResult> DeleteUser(int id)
{
// Delete user logic
return NoContent();
}
Implement authorization checks within your API to distinguish between different levels of access rights for users.
[Authorize(Roles = "Admin, Viewer")]
public class DataController : ApiController
{
public IHttpActionResult GetData()
{
// Only users with role "Admin" or "Viewer" can access data
var data = GetDataFromService();
return Ok(data);
}
[Authorize(Roles = "Admin")]
public IHttpActionResult UpdateData(MyDataModel model)
{
// Only users with role "Admin" can update data
UpdateDataService(model);
return Ok();
}
// Separate methods to get and update data
private object GetDataFromService() { /*...*/ }
private void UpdateDataService(MyDataModel model) { /*...*/ }
}
Allowlist β
Use an allowlist (or whitelist) to explicitly define the permitted values for sensitive parameters.
[HttpGet("articles")]
public IActionResult GetArticles([FromQuery] string category)
{
string[] allowedCategories = { "science", "technology", "business" };
if (!allowedCategories.Contains(category))
{
return BadRequest("Invalid category.");
}
// Fetch and return articles in the specified category
}
Implement an IP allowlist that permits requests only from known and trusted IP addresses.
public class IPAllowlistHandler : DelegatingHandler
{
private readonly string[] _trustedIPs;
public IPAllowlistHandler(string[] trustedIPs)
{
_trustedIPs = trustedIPs ?? throw new ArgumentNullException(nameof(trustedIPs));
}
protected override Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
{
var context = ((HttpContextBase)request.Properties["MS_HttpContext"]);
var requestIP = context.Request.UserHostAddress;
if (!_trustedIPs.Contains(requestIP))
{
return Task.FromResult(request.CreateResponse(HttpStatusCode.Forbidden, "Access denied from this IP address"));
}
return base.SendAsync(request, cancellationToken);
}
}
OWASP API Security Risks π
// Example of checking for broken user authentication, which is a common OWASP risk
public class AuthenticationMiddleware : OwinMiddleware
{
public AuthenticationMiddleware(OwinMiddleware next) : base(next) {}
public override async Task Invoke(IOwinContext context)
{
if (!UserIsAuthenticated(context))
{
context.Response.StatusCode = 401; // Unauthorized
await context.Response.WriteAsync("User authentication failed.");
return;
}
await Next.Invoke(context);
}
private bool UserIsAuthenticated(IOwinContext context)
{
// Implement your authentication logic here
// Make sure it's in line with OWASP recommendations
return true; // Placeholder for actual authentication check
}
}
Use an API Gateway π
Use an API Gateway to act as a single-entry point for all client requests.
// Configure API Gateway routes
var routes = new List<RouteConfiguration>
{
new RouteConfiguration
{
RouteId = "users-route",
UpstreamPathTemplate = "/api/users/{everything}",
DownstreamPathTemplate = "/api/users/{everything}",
DownstreamScheme = "https",
DownstreamHostAndPorts = new List<DownstreamHostAndPort>
{
new DownstreamHostAndPort
{
Host = "users-service",
Port = 443
}
}
},
// Additional route configurations
};
var config = new OcelotPipelineConfiguration
{
Routes = routes
};
// Configure authentication middleware
services.AddAuthentication()
.AddJwtBearer("users-service", options =>
{
// JWT bearer configuration for users service
})
.AddJwtBearer("products-service", options =>
{
// JWT bearer configuration for products service
});
await ocelotBuilder.AddOcelot(config)
.AddDelegatingHandler<AuthenticationDelegatingHandler>()
.Build()
.StartAsync();
Implement an API Gateway as the single entry point to your microservices.
public class ApiGatewayHandler : DelegatingHandler
{
protected override async Task<HttpResponseMessage> SendAsync(HttpRequestMessage request, CancellationToken cancellationToken)
{
// Pre-processing: authentication, logging, etc.
AuthenticateRequest(request);
// Route to the appropriate service
var response = RouteToService(request);
// Post-processing: modify response, add headers, etc.
return await ProcessResponse(response);
}
private void AuthenticateRequest(HttpRequestMessage request)
{
// Authentication logic
}
private Task<HttpResponseMessage> RouteToService(HttpRequestMessage request)
{
// Logic to route to specific services
// This is a placeholder for actual routing logic
return Task.FromResult(new HttpResponseMessage());
}
private async Task<HttpResponseMessage> ProcessResponse(HttpResponseMessage response)
{
// Response processing logic
return response;
}
}
Error Handling π¨
Default error handler
public class ErrorDetails
{
public int StatusCode { get; set; }
public string Message { get; set; }
}
public class GlobalExceptionFilter : IExceptionFilter
{
private readonly ILogger<GlobalExceptionFilter> _logger;
public GlobalExceptionFilter(ILogger<GlobalExceptionFilter> logger)
{
_logger = logger;
}
public void OnException(ExceptionContext context)
{
int statusCode = StatusCodes.Status500InternalServerError;
string message = "An unexpected error occurred.";
if (context.Exception is ArgumentException)
{
statusCode = StatusCodes.Status400BadRequest;
message = "Invalid request data.";
}
else if (context.Exception is UnauthorizedAccessException)
{
statusCode = StatusCodes.Status401Unauthorized;
message = "Authentication required.";
}
// Handle other specific exception types
_logger.LogError(context.Exception, "Unhandled exception occurred.");
context.Result = new ObjectResult(new ErrorDetails
{
StatusCode = statusCode,
Message = message
})
{
StatusCode = statusCode
};
context.ExceptionHandled = true;
}
}
// Register the global exception filter
services.AddControllers(options =>
{
options.Filters.Add<GlobalExceptionFilter>();
});
Custom error handler
public class GlobalExceptionHandler : ExceptionHandler
{
public override void Handle(ExceptionHandlerContext context)
{
// Log the exception details for internal use
LogException(context.Exception);
// Provide a friendly error message to the client
var result = new HttpResponseMessage(HttpStatusCode.InternalServerError)
{
Content = new StringContent("An unexpected error occurred. Please try again later."),
ReasonPhrase = "Critical Exception"
};
context.Result = new ErrorMessageResult(context.Request, result);
}
private void LogException(Exception exception)
{
// Implement logging logic
}
}
public class ErrorMessageResult : IHttpActionResult
{
private readonly HttpRequestMessage _request;
private readonly HttpResponseMessage _httpResponseMessage;
public ErrorMessageResult(HttpRequestMessage request, HttpResponseMessage httpResponseMessage)
{
_request = request;
_httpResponseMessage = httpResponseMessage;
}
public Task<HttpResponseMessage> ExecuteAsync(CancellationToken cancellationToken)
{
return Task.FromResult(_httpResponseMessage);
}
}
// Register in WebApiConfig
config.Services.Replace(typeof(IExceptionHandler), new GlobalExceptionHandler());
Input Validation π‘οΈ
Use data annotations and the [ApiController] attribute for basic validations.
public class CreateUserModel
{
[Required]
[StringLength(50)]
public string Username { get; set; }
[Required]
[EmailAddress]
public string Email { get; set; }
[Required]
[StringLength(100, MinimumLength = 6)]
public string Password { get; set; }
}
[HttpPost]
public IActionResult CreateUser([FromBody] CreateUserModel model)
{
if (!ModelState.IsValid)
{
return BadRequest(ModelState);
}
// Create user logic
return CreatedAtAction(nameof(GetUser), new { id = user.Id }, user);
}
For more complex validation scenarios, consider using a dedicated validation library like FluentValidation.
public class CreateUserValidator : AbstractValidator<CreateUserModel>
{
public CreateUserValidator()
{
RuleFor(x => x.Username)
.NotEmpty()
.MaximumLength(50);
RuleFor(x => x.Email)
.NotEmpty()
.EmailAddress();
RuleFor(x => x.Password)
.NotEmpty()
.Length(6, 100);
}
}
[HttpPost]
public IActionResult CreateUser([FromBody] CreateUserModel model)
{
var validator = new CreateUserValidator();
var validationResult = validator.Validate(model);
if (!validationResult.IsValid)
{
return BadRequest(validationResult.Errors);
}
// Create user logic
return CreatedAtAction(nameof(GetUser), new { id = user.Id }, user);
}
Implement input validation at the API gateway level to ensure that only valid requests are processed.
public class ValidateModelAttribute : ActionFilterAttribute
{
public override void OnActionExecuting(HttpActionContext actionContext)
{
if (!actionContext.ModelState.IsValid)
{
actionContext.Response = actionContext.Request.CreateErrorResponse(
HttpStatusCode.BadRequest, actionContext.ModelState);
}
}
}
// Usage in a Controller
public class MyModel
{
[Required]
public string Property1 { get; set; }
// Other properties and validation attributes
}
public class MyApiController : ApiController
{
[ValidateModel]
public IHttpActionResult Post(MyModel model)
{
// Proceed knowing the model is valid
ProcessData(model);
return Ok();
}
private void ProcessData(MyModel model)
{
// Processing logic
}
}