2024-02-01 | HowTo

NginX GeoIP Setup Guide

Integrating NGINX with Web App Session Authentication and URL Whitelisting

This guide demonstrates how to restrict access using NGINX so that only a specific whitelist of endpoints is publicly available, while all other requests are validated against your web app’s session mechanism.


1. Overview

The setup leverages NGINX’s auth_request module to offload session/token validation to your backend. Requests to protected resources invoke an internal endpoint that inspects session cookies (or JWTs), returning a 200 status for authenticated sessions and a 401 otherwise. Unauthenticated requests are then redirected to your login page.


2. Architecture and Workflow


3. NGINX Configuration

Below is a sample configuration demonstrating the core components.

server {
    listen 80;
    server_name example.com;

    # Public endpoints – no auth required.
    location ~ ^/(public1|public2|public3) {
        try_files $uri $uri/ =404;
    }

    # Login endpoint for redirection.
    location /login {
        proxy_pass http://app_backend/login;
    }

    # All other endpoints require session validation.
    location / {
        auth_request /auth;
        error_page 401 = @redirect_to_login;
        proxy_pass http://app_backend;
    }

    # Internal endpoint for session validation.
    location = /auth {
        internal;
        proxy_pass http://app_backend/validate;
        proxy_pass_request_body off;
        proxy_set_header Content-Length "";
        proxy_set_header Cookie $http_cookie;
    }

    # Redirect unauthorized users to the login page.
    location @redirect_to_login {
        return 302 /login;
    }
}

Explanation:


4. Backend Considerations

Your web application’s /validate endpoint should:

For example, a lightweight endpoint in a Node.js/Express app might look like:

app.get('/validate', (req, res) => {
  if (req.session && req.session.user) {
    return res.sendStatus(200);
  }
  res.sendStatus(401);
});

Ensure your login endpoint and session management logic are aligned with this validation mechanism.


5. Testing and Debugging