Configuring Token Authentication
Overview
Cloudflare Token Authentication allows you to restrict access to documents, files, and media to selected users without requiring them to register. This helps protect paid/restricted content from leeching and unauthorized sharing.
There are two options to configure Token Authentication, via Cloudflare Workers or Cloudflare Firewall Rules.
Option 1: Configure using Cloudflare Workers
Review the following Cloudflare Workers documentation to configure Token Authentication:
- Configure a Worker
- Use the Auth with Headers template
Option 2: Configure using firewall rules
A Pro, Business or Enterprise account is required to configure Token Authentication via firewall rules. To configure Token Authentication using firewall rules:
- Log in to the Cloudflare dashboard.
- Click the appropriate Cloudflare account for the domain where you want to enable Token Authentication.
- Navigate to Security > WAF.
- Click the Firewall rules tab.
- Click Create a firewall rule.
- Click the Edit expression link above the Expression Preview to switch to the Expression Preview editor.
The following example illustrates a rule that blocks any visitor that does not pass your HMAC key validation on a specific hostname and URL path. Details required for Token Authentication include:
- the path you wish to authenticate (e.g. test.domain.com/download/cat.jpg),
- the parameter name you wish the token to have (e.g. verify), and
- the desired token expiration times if any (e.g. 5 and 20 minutes).
For the following example URL,
test.domain.com/download/cat.jpg?verify=1484063787-9JQB8vP1z0yc5DEBnH6JGWM3mBmvIeMrnnxFi3WtJLE%3D
The example firewall rule looks like:
(http.host eq "test.domain.com" and not is\_timed\_hmac\_valid\_v0("mysecrettoken", http.request.uri,10800, http.request.timestamp.sec,8))
The components of this example firewall rule (using the example URL above) include:
- Token key = mysecrettoken
- Token expiration time = 10800 seconds
- Http.request.uri = /download/cat.jpg
- Http.request.timestamp.sec = 1484063787
- Separator: len(?verify=) = 8
To generate tokens for the paths using this Firewall Rule:
Python 3.8
import hmacimport base64import urllib.parseimport timefrom hashlib import sha256message = "/download/cat.jpg"secret = "mysecrettoken"separator = "?verify="timestamp = str(int(time.time()))digest = hmac.new((secret).encode('utf8'), "{}{}".format(message,timestamp).encode('utf8'), sha256)token = urllib.parse.quote_plus(base64.b64encode(digest.digest()))
print("{}{}{}-{}".format(message, separator, timestamp, token))
Python 2.7
import hmacimport base64import timeimport urllibfrom hashlib import sha256message = "/download/cat.jpg"secret = "mysecrettoken"separator = "verify"timestamp = str(int(time.time()))digest = hmac.new(secret, message + timestamp, sha256)param = urllib.urlencode({separator: '%s-%s' % (timestamp, base64.b64encode(digest.digest()))})
print("{}{}".format(message, param))
PHP
$message = "/download/cat.jpg";
$secret = "mysecrettoken";
$separator = "?verify=";
$time = time();
$token = $time . "-" . urlencode(base64_encode(hash_hmac("sha256", $message . $time, $secret, true)));
echo($message . $separator . $token);
Implement token creation
Implementing the token creation requires the following code entered at your origin server:
PHP Version
<?php
// Generate valid URL token$secret = "thisisasharedsecret";
$time = time();
$token = $time . "-" . urlencode(base64_encode(hash_hmac("sha256", "/download/private.jpg$time", $secret, true)));param = "verify=" . $token;
?>
Python Version
import hmacimport base64import timeimport urllibfrom hashlib import sha256
secret = "thisisasharedsecret"time = str(int(time.time()))digest = hmac.new(secret, "/download/cat.jpg" + time, sha256)param = urllib.urlencode({'verify': '%s-%s' % (time, base64.b64encode(digest.digest()))})
This will generate a URL parameter such as:
verify=1484063137-IaLGSmELTvlhfd0ItdN6PhhHTFhzx73EX8uy%2FcSDiIU%3D
Which you will then need to append to any URL under the domain.com/download/* path. For example:
/download/cat.jpg?verify=1484063787-9JQB8vP1z0yc5DEBnH6JGWM3mBmvIeMrnnxFi3WtJLE%3D
Please note that the token parameter needs to be the last parameter in the query string. You can test if URLs are being generated correctly on the server by enabling WAF managed rules on Simulate and monitoring the activity log in Security > Events.