Secure an app with OAuth1 client flow

Route plugins: Authentication

Before you start

If you already have an up and running otoroshi instance, you can skip the following instructions

Set up an Otoroshi

Let’s start by downloading the latest Otoroshi.

curl -L -o otoroshi.jar ''

then you can run start Otoroshi :

java -Dotoroshi.adminPassword=password -jar otoroshi.jar 

Now you can log into Otoroshi at with

Create a new route, exposed on, which will forward all requests to the mirror Each call to this service will returned the body and the headers received by the mirror.

curl -X POST '' \
-H "Content-type: application/json" \
-u admin-api-apikey-id:admin-api-apikey-secret \
-d @- <<'EOF'
  "name": "my-service",
  "frontend": {
    "domains": [""]
  "backend": {
    "targets": [
        "hostname": "",
        "port": 443,
        "tls": true

Running an simple OAuth 1 server

In this tutorial, we’ll instantiate a oauth 1 server with docker. If you alredy have the necessary, skip this section to.

Let’s start by running the server

docker run -d --name oauth1-server --rm \
    -p 5000:5000 \
    -e OAUTH1_CLIENT_ID=2NVVBip7I5kfl0TwVmGzTphhC98kmXScpZaoz7ET \
    -e OAUTH1_CLIENT_SECRET=wXzb8tGqXNbBQ5juA0ZKuFAmSW7RwOw8uSbdE3MvbrI8wjcbGp \

We created a oauth 1 server which accepts as Redirect URI. This URL is used by Otoroshi to retrieve a token and a profile at the end of an authentication process.

After this command, the container logs should output : - - [14/Oct/2021 12:10:49] "HEAD /api/health HTTP/1.1" 200 -

Create an OAuth 1 provider module

  1. Go ahead, and navigate to
  2. Click on the cog icon on the top right
  3. Then Authentication configs button
  4. And add a new configuration when clicking on the Add item button
  5. Select the Oauth1 provider in the type selector field
  6. Set a basic name and description like oauth1-provider
  7. Set 2NVVBip7I5kfl0TwVmGzTphhC98kmXScpZaoz7ET as Consumer key
  8. Set wXzb8tGqXNbBQ5juA0ZKuFAmSW7RwOw8uSbdE3MvbrI8wjcbGp as Consumer secret
  9. Set http://localhost:5000/oauth/request_token as Request Token URL
  10. Set http://localhost:5000/oauth/authorize as Authorize URL
  11. Set http://localhost:oauth/access_token as Access token URL
  12. Set http://localhost:5000/api/me as Profile URL
  13. Set as Callback URL
  14. At the bottom of the page, disable the secure button (because we’re using http and this configuration avoid to include cookie in an HTTP Request without secure channel, typically HTTPs)

At this point, your configuration should be similar to :

With this configuration, the connected user will receive default access on teams and organizations. If you want to change the access rights for a specific user, you can achieve it with the Rights override field and a configuration like :

  "": [
      "tenant": "*:rw",
      "teams": [

Save your configuration at the bottom of the page, then navigate to the danger zone to use your module as a third-party connection to the Otoroshi UI.

Connect to Otoroshi with OAuth1 authentication

To secure Otoroshi with your OAuth1 configuration, we have to register an Authentication configuration as a BackOffice Auth. configuration.

  1. Navigate to the danger zone (when clicking on the cog on the top right and selecting Danger zone)
  2. Scroll to the BackOffice auth. settings
  3. Select your last Authentication configuration (created in the previous section)
  4. Save the global configuration with the button on the top right

Testing your configuration

  1. Disconnect from your instance
  2. Then click on the Login using third-party button (or navigate to
  3. Click on Login using Third-party button
  4. If all is configured, Otoroshi will redirect you to the oauth 1 server login page
  5. Set example-user as user and trust the user by clicking on yes button.
  6. Good work! You’re connected to Otoroshi with an OAuth1 module.

A fallback solution is always available in the event of a bad authentication configuration. By going to, the administrators will be able to redefine the configuration.

Secure an app with OAuth 1 authentication

With the previous configuration, you can secure any of Otoroshi services with it.

The first step is to apply a little change on the previous configuration.

  1. Navigate to
  2. Create a new auth module configuration with the same values.
  3. Replace the Callback URL field to (we changed this value because the redirection of a logged user by a third-party server is cover by an other route by Otoroshi).
  4. Disable the secure button (because we’re using http and this configuration avoid to include cookie in an HTTP Request without secure channel, typically HTTPs)

Note : an Otoroshi service is called a private app when it is protected by an authentication module.

Our example server supports only one redirect URI. We need to kill it, and to create a new container with as OAUTH1_REDIRECT_URI

docker rm -f oauth1-server
docker run -d --name oauth1-server --rm \
    -p 5000:5000 \
    -e OAUTH1_CLIENT_ID=2NVVBip7I5kfl0TwVmGzTphhC98kmXScpZaoz7ET \
    -e OAUTH1_CLIENT_SECRET=wXzb8tGqXNbBQ5juA0ZKuFAmSW7RwOw8uSbdE3MvbrI8wjcbGp \

Once the authentication module and the new container created, we can define the authentication module on the service.

  1. Navigate to any created route
  2. Search in the list of plugins the plugin named Authentication
  3. Select your Authentication config inside the list
  4. Don’t forget to save your configuration.

Now you can try to call your route and see the login module appears.

The allow access to the user.

If you had any errors, make sure of :

  • check if you are on http or https, and if the secure cookie option is enabled or not on the authentication module
  • check if your OAuth1 server has the REDIRECT_URI set on privateapps/…
  • Make sure your server supports POST or GET OAuth1 flow set on authentication module

Once the configuration is working, you can check, when connecting with an Otoroshi admin user, the Private App session created (use the cog at the top right of the page, and select Priv. app sesssions, or navigate to

One interesing feature is to check the profile of the connected user. In our case, when clicking on the Profile button of the right user, we should have :

  "email": "",
  "id": 1,
  "name": "test name",
  "screen_name": "example-user"