User Registration¶
Authors: Artyom Kazak, Matthias Fischmann
This page describes the “normal” user registration flow. Autoprovisioning is covered separately.
Summary¶
The vast majority of our API is only available to Wire users. Unless a user is autoprovisioned, they have to register an account by calling the POST /register
endpoint.
Most users also go through activation – sharing and verifying an email address with Wire. This can happen either before or after registration. Certain functionality is only available to activated users.
Standard registration flow¶
During the standard registration flow, the user first calls POST /activate/send
to pre-verify their email address.
After receiving a six-digit activation code via email message, it can be submitted with the registration request via POST /register
. If the code is correct, the account will be activated immediately. Here is a sample request and response:
The response contains an access cookie that can be used to access the rest of the backend API. The cookie can be assigned a label by adding a "label": <...>
field when calling /register
.
If the code is incorrect or if an incorrect code has been tried enough times, the response will be as follows:
Registration without pre-verification¶
NOTE: This flow is currently not used by any clients. At least this was the state on 2020-05-28
It is also possible to call POST /register
without verifying the email address, in which case the account will have to be activated later by calling POST /activate
. Sample API request and response:
A verification email will be sent to the email address (if provided).
Anonymous registration, aka “Wireless”¶
A user can be created without email, in which case only "name"
is required. The "name"
does not have to be unique. This feature is used for guest rooms.
An anonymous, non-activated account is only usable for a period of time specified in brig.yaml
at zauth.authSettings.sessionTokenTimeout
, which is set to 1 day for Wire production. (The access cookie returned by /register
can not be refreshed, and an anonymous user can not use /login
to get a new cookie.)
Sample API request and response:
Blocking creation of personal users, new teams¶
Details¶
You can find the exhaustive list of all routes here:
The paths not cryptographically authenticated can be found by searching for the disable_zauth:
flag (must be true for env: prod
or env: all
).
Two of them allow users to create new users or teams:
/register
/activate
These end-points support 5 flows:
- new team account
- new personal (teamless) account
- invitation code from team, new member
- ephemeral user
- [not supported by clients] new inactive user account
We need an option to block 1, 2, 5 on-prem; 3, 4 should remain available (no block option). There are also provisioning flows via SAML or SCIM, which are not critical. In short, this could refactored into:
- Allow team members to register (via email or SSO)
- Allow ephemeral users
During registration, we can take advantage of NewUserOrigin; we’re particularly interested in NewUserOriginTeamUser
–> only NewTeamMember
or NewTeamMemberSSO
should be accepted. In case this is a Nothing
, we need to check if the user expires, i.e., if the user has no identity (and thus Ephemeral
).
So /register
should only succeed iff at least one of these conditions is true:
The rest of the unauthorized end-points is safe:
/password-reset
/delete
: similar to password reset, for deleting a personal account with password./login
/login/send
/access
/sso/initiate-login
: authenticated via IdP./sso/finalize-login
: authenticated via IdP./sso
: authenticated via IdP or ok to expose to world (/metadata
)/scim/v2
: authenticated via HTTP simple auth.~* ^/teams/invitations/info$
: onlyGET
; requires invitation code.~* ^/teams/invitations/by-email$
: onlyHEAD
./invitations/info
: discontinued feature, can be removed from nginz config./conversations/code-check
: link validation for ephemeral/guest users./provider/*
: bots need to be registered to a team before becoming active. so if an attacker does not get access to a team, they cannot deploy a bot.~* ^/custom-backend/by-domain/([^/]*)$
: onlyGET
; only exposes a list of domains that has is maintained through an internal end-point. used to redirect stock clients from the cloud instance to on-prem instances.~* ^/teams/api-docs
: onlyGET
; swagger for part of the rest API. safe: it is trivial to identify the software that is running on the instance, and from there it is trivial to get to the source on github, where this can be obtained easily, and more./billing
: separate billing service, usually not installed for on-prem instances./calling-test
: separate testing service that has its own authentication.