What is upstream authentication?

Upstream authentication is a security method used to protect web applications from unauthorized access. With this method, the user is authenticated before accessing the actual application. This means that the user must confirm their identity before accessing the application.

This authentication is typically carried out by an upstream instance such as a Web Application Firewall (WAF) or a reverse proxy. Before a request from a user is forwarded to the actual web application, the upstream authentication method checks the user's access authorization. This can be done, for example, by verifying the username and password or by other authentication methods.

The main advantage of upstream authentication is that it protects the web application from attacks by unknown attackers as only authenticated users are granted access. Additionally, delegating authentication to an upstream entity enables the implementation of single sign-on scenarios across multiple web applications, improving usability and security. In addition, the authentication processes do not have to be developed and implemented separately for each application. Application developers can concentrate on the business logic.

Airlock Secure Access Hub offers upstream authentication as part of its security features. Through a dynamic whitelist filtering method, Airlock effectively protects web applications from unauthorized access and enables the implementation of single sign-on across multiple applications. Find out more about the upstream authentication functions of Airlock Secure Access Hub at the following link: Airlock Secure Access Hub - Upstream authentication.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge