Hi everyone,
We’re deploying JupyterHub in our organization, one of the requirement is to pass a penetration testing. The testing has one finding: Sensitive information passed as GET parameter, and we don’t have a clue how to fix
To reproduce the issue, just trying to visit some non-existent page: /user/<user_id>/notexists
, then the return page will contains some link with ‘token’ parameter like /user/<user_id>/lab?token=xxxxx
:
After some searching I believe this is documented here: Security in the Jupyter Server — Jupyter Server documentation , seems the token is used to authenticate the underlie jupyter-server?
We’re using SAML to authenticate user in the hub. So I want to know more about the process after authentication and how the token got generated and passed around between the components (e.g. the hub, the single user server). And most importantly, is it possible to avoid exposing the token in URL?
Could someone help me pls, thanks in advanced.