I had configured subdomains on a site to share forms authentication, however decisions were made to change one of websites over to a different domain. So now site A needs to send a user to the site B. Normally I would use something like Component Space to implement an SSO process for this, but this company doesn't already have access to any such library.
So my boss came up with a home rolled process. For this particular application, the risk is so low that we really just need to do "something" so we can say "we secured it". So I'm happy to do whatever makes him happy to just get the project moving. Though I can see us potentially having another project in the future where security may be a bigger concern and the thought of reusing this code would come up. So any notes about the security risks of this process are certainly appreciated in case I need to bring them up at a later point in time.
But really what I'm interested in at the moment is whether hashing is even providing a benefit in the following scenario:
Domain A is secured by a login. Domain B uses the following process to "authenticate" the user.
Logged in user navigates to a page on domain A and it generates a token/guid to store in the database which is associated with that user's id.
User is redirected to domain B with query parameters in the url which include the customer's id and a hash of the token from step 1).
Domain B looks to the database to find the token that was saved in step 1) and hashes it, verifying the hash is the same as the one provided in the url query parameter.
Let's assume the token also expires after a period of time if not used.
While hashing sort of obfuscates the token, does it actually make it any more secure or would you say it would be no less secure to simply pass the token itself and just check that the token exists in the database?
saltto the server side hashing on both domain A and domain B to make spoofing them even harder.saltin the hashing process.1you end up w/ a value of8fa14cdd754f91cc6554c9e71929cce7