Configure and use secure token
Configure secure token
Do the first three steps in Gcore Customer Portal on the Secure token tab.
1. Enable the “Secure token” option in the resource settings.
2. Enter a key that contains between 6 and 32 characters.
3. If you want your content to be accessible from any IP address, leave the “Add a client’s IP to the token” unchecked. If you want to make your content available only from one IP, check the checkbox (you will specify the allowlisted IP address later at Step 4).
4. Do this step on your origin server. Insert a script on your website which generates secure links. The generated links should look like as below:
Where:
http://cdn.example.com/photo.jpeg
is the path to the file,DMF1ucDxtHCxwYQ
is the output of the “MD5(String)” hash function, where String is the parameter obtained by merging elements:<link expiry time><file path><allowlisted IP address><key from Step 2>
,2147483647
is the time in the UNIX timestamp format until which the link is considered valid.
We have prepared script templates for PHP, Python, and OpenSSL — just copy one of them from the “Scripts for link generation” section below. The script will start creating secure links to the content.
5. Do this step on your origin server. Arrange the content on your website to allow access to the protected files only over a secured link — that is, rule out the delivery of the required content over a link without a secure token.
Moreover, make sure our CDN can access the content on your origin server regardless of whether a key is present or not.
Scripts for link generation
Generate links with a secure token in PHP
Below is the script for creating temporary links with the IP-based access restriction. The files will be accessible only from an allowlisted IP address and only until the link expires.
Below is the script for creating temporary links without any IP-based access restriction. The files will be accessible from any IP address, but only until the link expires.
In these scripts:
- $secret is the secret key,
- $path is the path to the file,
- $ip is the IP address that is allowed to access the content,
- $expires is the link expiry time (in seconds),
- $url is the address of the file.
Generate links with a secure token in Python
The script for creating temporary links with the IP-based access restriction. The files will be accessible only from an allowlisted IP address and only until the link expires.
Below is the script for creating temporary links without any IP-based access restriction. The files will be accessible from any IP address, but only until the link expires.
In these scripts:
- secret is the secret key,
- path is the path to the file,
- ip is the IP address that is allowed to access the content,
- expires is the link expiry time (in seconds),
- secured_url is the link to the file.
Generate a secure token in OpenSSL
The script for creating a secure token that limits the link lifespan and allows access only to an allowlisted IP:
The script for creating a secure token that only limits the link lifespan:
In these scripts:
- 2147483647/images/1.jpg is the path to the file,
- 1.2.3.4 is the IP address that is allowed to access the content,
- secret_key is a secret key you specified at Step 2 of the Configure Secure Token instruction.
The scripts above can only generate a secure token. You need to create a separate script that will add a secure token and expiry time to links. The script is supposed to create a link as shown below:
Where:
- http://cdn.example.com/photo.jpeg is the path to the file,
- DMF1ucDxtHCxwYQ is a secure token,
- 2147483647 is the time in the UNIX timestamp format until which the link is considered valid.