Exposing the BiG EVAL REST API to other Network Segments

Depending on your usage scenario it may be needed to expose the REST API of BiG EVAL to other network segments or even to the public internet to allow 3rd party services like Microsoft Power Automate to access the REST API.

Despite of all the available security features BiG EVAL provides, it is your own responsibility to secure your BiG EVAL installation against unwanted access or against any data loss. This is possible by using BiG EVAL’s security features, but it also needs good planning and utilizing your network security features and appliances. BiG EVAL is not responsible for any damage or data loss that may happen if you utilize these features incorrectly.

In the following, we show the available security features of BiG EVAL and possible security features you may have in your network environment. Please plan the exposure of the BiG EVAL REST API together with your network architects and administrators to build the most secure infrastructure.

Planning

Your network infrastructure and architecture is very individual. So we cannot give you a common advice how to expose and secure the BiG EVAL REST API to other network segments or even the public internet. That’s why we suggest to sit down with your network architects and administrators to do the planning and implementation. In the following we show you some possibilities you should take in consideration.

Security Features of BiG EVAL

BiG EVAL comes with the following security features that allow you to harden and secure access to the BiG EVAL REST API.

  • OAuth 2.0
    All requests to the REST API are secured by OAuth 2.0 (access_code or client_security flows). This means, that all outside services need to be configured and permitted access by the BiG EVAL administrator.
  • SSL Communication
    All HTTP communication can be encrypted with SSL-certificates.
  • Enforced user authentication
    Access to the web frontend is secured either by BiG EVAL’s own user management or also via LDAP Single Sign on.
  • Logging
    All HTTP-requests are logged for at least 5 days.

Network Security Infrastructure

Your network infrastructure almost certainly has some security appliances or technologies like:

  • Firewalls
  • Proxy Servers
  • Application Security Appliances
  • Traffic Analyzers
  • and more

You network architects and administrators know best how to utilize these appliances correctly to first, expose the BiG EVAL REST API to another network segment, and second, to secure and limit access to the REST API.

What considerations you should take as well

  • The web server of BiG EVAL serves the REST API as well as the Web Frontend of BiG EVAL. Both of these services are provided on the same host only separated by subfolders.
    – REST API: https://bigeval.mycompany.com/api/v1/…
    – Web-Frontend: https://bigeval.mycompany.com/
    This means, that the web-frontend will be exposed to the other network segment or public internet as well if you don’t apply a filter on your firewall, proxy server or other security devices.
  • Use IP filtering features of your network security appliances to limit access to the REST API.

Implementation

These are the things that need to be done to expose the REST API of BiG EVAL to other network segments. Depending on your network infrastructure and security needs you may add other actions.

  • Configure a DNS-name to be available in the other network segment or the public internet.
  • Ensure BiG EVAL listens on that DNS-name by adding the URL to the appsettings.json and registering the URL in windows.
  • Configure BiG EVAL to use HTTPS as the communication channel.
  • Configure a device (proxy, firewall or similar) to route HTTPS-traffic between the BiG EVAL server and the other network segment or the public internet.
    • Apply IP-filtering or similar features to limit the allowed traffic.
    • Apply URL-filtering to allow access to the API only (/api/*).
  • Add an API-client for your outside service that should access BiG EVAL.
Table of Contents