summaryrefslogtreecommitdiff
path: root/docs/tutorials/wiki2/authorization.rst
blob: 3f1d2669a3513272ae2d917fd3b1ec3b6b387af6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
.. _wiki2_adding_authorization:

====================
Adding Authorization
====================

Our application currently allows anyone with access to the server to
view, edit, and add pages to our wiki.  For purposes of demonstration
we'll change our application to allow only people whom possess a
specific username (`editor`) to add and edit wiki pages but we'll
continue allowing anyone with access to the server to view pages.
:app:`Pyramid` provides facilities for *authorization* and
*authentication*.  We'll make use of both features to provide security
to our application.

The source code for this tutorial stage can be browsed at
`http://github.com/Pylons/pyramid/tree/master/docs/tutorials/wiki2/src/authorization/
<http://github.com/Pylons/pyramid/tree/master/docs/tutorials/wiki2/src/authorization/>`_.

Changing ``__init__.py`` For Authorization
-------------------------------------------

We're going to be making several changes to our ``__init__.py`` file which
will help us configure an authorization policy.

Adding A Root Factory
~~~~~~~~~~~~~~~~~~~~~

We're going to start to use a custom :term:`root factory` within our
``__init__.py`` file.  The objects generated by the root factory will be
used as the :term:`context` of each request to our application.  In
order for :app:`Pyramid` declarative security to work properly, the
context object generated during a request must be decorated with
security declarations; when we begin to use a custom root factory to
generate our contexts, we can begin to make use of the declarative
security features of :app:`Pyramid`.

We'll modify our ``__init__.py``, passing in a :term:`root factory` to our
:term:`Configurator` constructor.  We'll point it at a new class we create
inside our ``models.py`` file.  Add the following statements to your
``models.py`` file:

.. code-block:: python

   from pyramid.security import Allow
   from pyramid.security import Everyone

   class RootFactory(object):
       __acl__ = [ (Allow, Everyone, 'view'), 
                   (Allow, 'group:editors', 'edit') ]
       def __init__(self, request):
           pass

The ``RootFactory`` class we've just added will be used by
:app:`Pyramid` to construct a ``context`` object.  The context is
attached to the request object passed to our view callables as the
``context`` attribute.

All of our context objects will possess an ``__acl__`` attribute that
allows :data:`pyramid.security.Everyone` (a special principal) to
view all pages, while allowing only a :term:`principal` named
``group:editors`` to edit and add pages.  The ``__acl__`` attribute
attached to a context is interpreted specially by :app:`Pyramid` as
an access control list during view callable execution.  See
:ref:`assigning_acls` for more information about what an :term:`ACL`
represents.

.. note: Although we don't use the functionality here, the ``factory`` used
   to create route contexts may differ per-route as opposed to globally.  See
   the ``factory`` argument to
   :meth:`pyramid.config.Configurator.add_route` for more info.

We'll pass the ``RootFactory`` we created in the step above in as the
``root_factory`` argument to a :term:`Configurator`.  

Configuring an Authorization Policy
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For any :app:`Pyramid` application to perform authorization, we need to add a
``security.py`` module (we'll do that shortly) and we'll need to change our
``__init__.py`` file to add an :term:`authentication policy` and an
:term:`authorization policy` which uses the ``security.py`` file for a
*callback*.

We'll change our ``__init__.py`` file to enable an
``AuthTktAuthenticationPolicy`` and an ``ACLAuthorizationPolicy`` to enable
declarative security checking.  We'll also change ``__init__.py`` to add a
:meth:`pyramid.config.Configurator.add_view` call to points at our
``login`` :term:`view callable`, also known as a :term:`forbidden view`.
This configures our newly created login view to show up when :app:`Pyramid`
detects that a view invocation can not be authorized.  Also, we'll add
``view_permission`` arguments with the value ``edit`` to the ``edit_page``
and ``add_page`` routes.  This indicates that the view callables which these
routes reference cannot be invoked without the authenticated user possessing
the ``edit`` permission with respect to the current context.

This makes the assertion that only users who possess the effective ``edit``
permission at the time of the request may invoke those two views.  We've
granted the ``group:editors`` principal the ``edit`` permission at the root
model via its ACL, so only the a user whom is a member of the group named
``group:editors`` will able to invoke the views associated with the
``add_page`` or ``edit_page`` routes.

Viewing Your Changes
~~~~~~~~~~~~~~~~~~~~

When we're done configuring a root factory, adding an authorization policy,
and adding views, your application's ``__init__.py`` will look like this:

.. literalinclude:: src/authorization/tutorial/__init__.py
   :linenos:
   :language: python

Note that that the
:class:`pyramid.authentication.AuthTktAuthenticationPolicy` constructor
accepts two arguments: ``secret`` and ``callback``.  ``secret`` is a string
representing an encryption key used by the "authentication ticket" machinery
represented by this policy: it is required.  The ``callback`` is a string,
representing a :term:`dotted Python name`, which points at the
``groupfinder`` function in the current directory's ``security.py`` file.  We
haven't added that module yet, but we're about to.


Adding ``security.py``
~~~~~~~~~~~~~~~~~~~~~~

Add a ``security.py`` module within your package (in the same directory as
:file:`__init__.py`, :file:`views.py`, etc) with the following content:

.. literalinclude:: src/authorization/tutorial/security.py
   :linenos:
   :language: python

The groupfinder defined here is an :term:`authentication policy`
"callback"; it is a callable that accepts a userid and a request.  If
the userid exists in the system, the callback will return a sequence
of group identifiers (or an empty sequence if the user isn't a member
of any groups).  If the userid *does not* exist in the system, the
callback will return ``None``.  In a production system, user and group
data will most often come from a database, but here we use "dummy"
data to represent user and groups sources. Note that the ``editor``
user is a member of the ``group:editors`` group in our dummy group
data (the ``GROUPS`` data structure).

We've given the ``editor`` user membership to the ``group:editors`` by
mapping him to this group in the ``GROUPS`` data structure (``GROUPS =
{'editor':['group:editors']}``).  Since the ``groupfinder`` function
consults the ``GROUPS`` data structure, this will mean that, as a
result of the ACL attached to the root returned by the root factory,
and the permission associated with the ``add_page`` and ``edit_page``
views, the ``editor`` user should be able to add and edit pages.

Adding Login and Logout Views
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

We'll add a ``login`` view callable which renders a login form and
processes the post from the login form, checking credentials.

We'll also add a ``logout`` view callable to our application and
provide a link to it.  This view will clear the credentials of the
logged in user and redirect back to the front page.

We'll add a different file (for presentation convenience) to add login
and logout view callables.  Add a file named ``login.py`` to your
application (in the same directory as ``views.py``) with the following
content:

.. literalinclude:: src/authorization/tutorial/login.py
   :linenos:
   :language: python

Changing Existing Views
~~~~~~~~~~~~~~~~~~~~~~~

Then we need to change each of our ``view_page``, ``edit_page`` and
``add_page`` views in ``views.py`` to pass a "logged in" parameter to
its template.  We'll add something like this to each view body:

.. ignore-next-block
.. code-block:: python
   :linenos:

   from pyramid.security import authenticated_userid
   logged_in = authenticated_userid(request)

We'll then change the return value of these views to pass the
`resulting `logged_in`` value to the template, e.g.:

.. ignore-next-block
.. code-block:: python
   :linenos:

   return dict(page = context,
               content = content,
               logged_in = logged_in,
               edit_url = edit_url)

Adding the ``login.pt`` Template
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Add a ``login.pt`` template to your templates directory.  It's
referred to within the login view we just added to ``login.py``.

.. literalinclude:: src/authorization/tutorial/templates/login.pt
   :language: xml
   :tab-width: 2

Change ``view.pt`` and ``edit.pt``
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

We'll also need to change our ``edit.pt`` and ``view.pt`` templates to
display a "Logout" link if someone is logged in.  This link will
invoke the logout view.

To do so we'll add this to both templates within the ``<div id="right"
class="app-welcome align-right">`` div:

.. code-block:: xml

   <span tal:condition="logged_in">
      <a href="${request.application_url}/logout">Logout</a>
   </span>

Viewing the Application in a Browser
------------------------------------

We can finally examine our application in a browser.  The views we'll
try are as follows:

- Visiting ``http://localhost:6543/`` in a browser invokes the
  ``view_wiki`` view.  This always redirects to the ``view_page`` view
  of the FrontPage page object.  It is executable by any user.

- Visiting ``http://localhost:6543/FrontPage`` in a browser invokes
  the ``view_page`` view of the FrontPage page object.

- Visiting ``http://localhost:6543/FrontPage/edit_page`` in a browser
  invokes the edit view for the FrontPage object.  It is executable by
  only the ``editor`` user.  If a different user (or the anonymous
  user) invokes it, a login form will be displayed.  Supplying the
  credentials with the username ``editor``, password ``editor`` will
  display the edit page form.

- Visiting ``http://localhost:6543/add_page/SomePageName`` in a
  browser invokes the add view for a page.  It is executable by only
  the ``editor`` user.  If a different user (or the anonymous user)
  invokes it, a login form will be displayed.  Supplying the
  credentials with the username ``editor``, password ``editor`` will
  display the edit page form.

Seeing Our Changes To ``views.py`` and our Templates
----------------------------------------------------

Our ``views.py`` module will look something like this when we're done:

.. literalinclude:: src/authorization/tutorial/views.py
   :linenos:
   :language: python

Our ``edit.pt`` template will look something like this when we're done:

.. literalinclude:: src/authorization/tutorial/templates/edit.pt
   :language: xml
   :tab-width: 2

Our ``view.pt`` template will look something like this when we're done:

.. literalinclude:: src/authorization/tutorial/templates/view.pt
   :language: xml
   :tab-width: 2

Revisiting the Application
---------------------------

When we revisit the application in a browser, and log in (as a result
of hitting an edit or add page and submitting the login form with the
``editor`` credentials), we'll see a Logout link in the upper right
hand corner.  When we click it, we're logged out, and redirected back
to the front page.

.. _wiki2_flow_of_authentication:

Overall flow of an authentication
---------------------------------

Now that you have seen all the pieces of the authentication
mechanism, here are some examples that show how they all work
together.

#. Failed login: The user requests ``/FrontPage/edit_page``.  The
   site presents the login form.  The user enters ``editor`` as
   the login, but enters an invalid password ``bad``.
   The site redisplays the login form with the message "Failed
   login".  See :ref:`failed_login`.

#. The user again requests ``/FrontPage/edit_page``.  The site
   presents the login form, and this time the user enters
   login ``editor`` and password ``editor``.  The site presents
   the edit form with the content of ``/FrontPage``.  The user
   makes some changes and saves them.  See :ref:`good_login`.

#. The user again revisits ``/FrontPage/edit_page``.  The site
   goes immediately to the edit form without requesting
   credentials. See :ref:`revisit`.

#. The user clicks the ``Logout`` link.  See :ref:`logging_out`.

.. _failed_login:

Failed login
~~~~~~~~~~~~

The process starts when the user enters URL
``http://localhost:6543/FrontPage/edit_page``.  Let's assume that
this is the first request ever made to the application and the
page database is empty except for the ``Page`` instance created
for the front page by the ``initialize_sql`` function in
:file:`models.py`.

This process involves two complete request/response cycles.

1. From the front page, the user clicks :guilabel:`Edit page`.
   The request is to ``/FrontPage/edit_page``.  The view callable
   is ``login.login``. The response is the ``login.pt`` template
   with blank fields.

2. The user enters invalid credentials and clicks :guilabel:`Log
   in`.  A ``POST`` request is sent to ``/FrontPage/edit_page``.
   The view callable is again ``login.login``.  The response is
   the ``login.pt`` template showing the message "Failed login",
   with the entry fields displaying their former values.

Cycle 1:

#. During URL dispatch, the route ``'/{pagename}/edit_page'`` is
   considered for matching.  The associated view has a
   ``view_permission='edit'`` permission attached, so the
   dispatch logic has to verify that the user has that permission
   or the route is not considered to match.
   
   The context for all route matching comes from the configured
   root factory, :meth:`RootFactory` in :file:`models.py`.
   This class has an ``__acl__`` attribute that defines the
   access control list for all routes::

        __acl__ = [ (Allow, Everyone, 'view'),
                    (Allow, 'group:editors', 'edit') ]

   In practice, this means that for any route that requires the
   ``edit`` permission, the user must be authenticated and
   have the ``group:editors`` principal or the route is not
   considered to match.

#. To find the list of the user's principals, the authorization
   first policy checks to see if the user has a
   ``paste.auth.auth_tkt`` cookie.  Since the user has never been
   to the site, there is no such cookie, and the user is
   considered to be unauthenticated.

#. Since the user is unauthenticated, the ``groupfinder``
   function in :file:`security.py` is called with ``None`` as its
   ``userid`` argument.  The function returns an empty list of
   principals.

#. Because that list does not contain the ``group:editors``
   principal, the ``'/{pagename}/edit_page'`` route's ``edit``
   permission fails, and the route does not match.

#. Because no routes match, the `forbidden view` callable is
   invoked: the ``login`` function in module ``login.py``.

#. Inside the ``login`` function, the value of ``login_url`` is
   ``http://localhost:6543/login``, and the value of
   ``referrer`` is ``http://localhost:6543/FrontPage/edit_page``.
   
   Because ``request.params`` has no key for ``'came_from'``, the
   variable ``came_from`` is also set to
   ``http://localhost:6543/FrontPage/edit_page``.  Variables
   ``message``, ``login``, and ``password`` are set to the empty
   string.

   Because ``request.params`` has no key for
   ``'form.submitted'``, the ``login`` function returns this
   dictionary::

    {'message': '', 'url':'http://localhost:6543/login',
     'came_from':'http://localhost:6543/FrontPage/edit_page',
     'login':'', 'password':''}

#. This dictionary is used to render the ``login.pt`` template.
   In the form, the ``action`` attribute is
   ``http://localhost:6543/login``, and the value of
   ``came_from`` is included in that form as a hidden field
   by this line in the template::

       <input type="hidden" name="came_from" value="${came_from}"/>

Cycle 2:

#. The user enters incorrect credentials and clicks the
   :guilabel:`Log in` button, which does a ``POST`` request to
   URL ``http://localhost:6543/login``.  The name of the
   :guilabel:`Log in` button in this form is ``form.submitted``.

#. The route with pattern ``'/login'`` matches this URL, so
   control is passed again to the ``login`` view callable.
   
#. The ``login_url`` and ``referrer`` have the same value
   this time (``http://localhost:6543/login``), so variable
   ``referrer`` is set to ``'/'``.

   Since ``request.params`` does have a key ``'form.submitted'``,
   the values of ``login`` and ``password`` are retrieved from
   ``request.params``.

   Because the login and password do not match any of the entries
   in the ``USERS`` dictionary in ``security.py``, variable
   ``message`` is set to ``'Failed login'``.

   The view callable returns this dictionary::

    {'message':'Failed login',
     'url':'http://localhost:6543/login', 'came_from':'/',
     'login':'editor', 'password':'bad'}

#. The ``login.pt`` template is rendered using those values.

.. _good_login:

Successful login
~~~~~~~~~~~~~~~~

In this scenario, the user again requests URL
``/FrontPage/edit_page``.

This process involves four complete request/response cycles.

1. The user clicks :guilabel:`Edit page`.  The view callable is
   ``login.login``.  The response is template ``login.pt``,
   with all the fields blank.

2. The user enters valid credentials and clicks :guilabel:`Log in`.
   The view callable is ``login.login``.  The response is a
   redirect to ``/FrontPage/edit_page``.

3. The view callable is ``views.edit_page``.  The response
   renders template ``edit.pt``, displaying the current page
   content.

4. The user edits the content and clicks :guilabel:`Save`.
   The view callable is ``views.edit_page``.  The response
   is a redirect to ``/FrontPage``.

Execution proceeds as in :ref:`failed_login`, up to the point
where the password ``editor`` is successfully matched against the
value from the ``USERS`` dictionary.

Cycle 2:

#. Within the ``login.login`` view callable, the value of
   ``login_url`` is ``http://localhost:6543/login``, and the
   value of ``referrer`` is ``'/'``, and ``came_from`` is
   ``http://localhost:6543/FrontPage/edit_page`` when this block
   is executed:

   .. code-block:: python

        if USERS.get(login) == password:
            headers = remember(request, login)
            return HTTPFound(location=came_from, headers=headers)

#. Because the password matches this time,
   :mod:`pyramid.security.remember` returns a sequence of header
   tuples that will set a ``paste.auth.auth_tkt`` authentication
   cookie in the user's browser for the login ``'editor'``.

#. The ``HTTPFound`` exception returns a response that redirects
   the browser to ``http://localhost:6543/FrontPage/edit_page``,
   including the headers that set the authentication cookie.

Cycle 3:

#. Route pattern ``'/{pagename}/edit_page'`` matches this URL,
   but the corresponding view is restricted by an ``'edit'``
   permission.
   
#. Because the user now has an authentication cookie defining
   their login name as ``'editor'``, the ``groupfinder`` function
   is called with that value as its ``userid`` argument.

#. The ``groupfinder`` function returns the list
   ``['group:editors']``.  This satisfies the access control
   entry ``(Allow, 'group:editors', 'edit')``, which grants the
   ``edit`` permission.  Thus, this route matches, and control
   passes to view callable ``edit_page``.

#. Within ``edit_page``, ``name`` is set to ``'FrontPage'``, the
   page name from ``request.matchdict['pagename']``, and
   ``page`` is set to an instance of :class:`models.Page`
   that holds the current content of ``FrontPage``.

#. Since this request did not come from a form,
   ``request.params`` does not have a key for
   ``'form.submitted'``.

#. The ``edit_page`` function calls
   :meth:`pyramid.security.authenticated_userid` to find out
   whether the user is authenticated.  Because of the cookies
   set previously, the variable ``logged_in`` is set to
   the userid ``'editor'``.

#. The ``edit_page`` function returns this dictionary::

    {'page':page, 'logged_in':'editor',
     'save_url':'http://localhost:6543/FrontPage/edit_page'}

#. Template :file:`edit.pt` is rendered with those values.
   Among other features of this template, these lines
   cause the inclusion of a :guilabel:`Logout` link::

      <span tal:condition="logged_in">
        <a href="${request.application_url}/logout">Logout</a>
      </span>

   For the example case, this link will refer to
   ``http://localhost:6543/logout``.

   These lines of the template display the current page's
   content in a form whose ``action`` attribute is
   ``http://localhost:6543/FrontPage/edit_page``::

      <form action="${save_url}" method="post">
        <textarea name="body" tal:content="page.data" rows="10" cols="60"/>
        <input type="submit" name="form.submitted" value="Save"/>
      </form>

Cycle 4:

#. The user edits the page content and clicks
   :guilabel:`Save`.

#. URL ``http://localhost:6543/FrontPage/edit_page`` goes through
   the same routing as before, up until the line that checks
   whether ``request.params`` has a key ``'form.submitted'``.
   This time, within the ``edit_page`` view callable, these
   lines are executed::
    
        page.data = request.params['body']
        session.add(page)
        return HTTPFound(location = route_url('view_page', request,
                                              pagename=name))

   The first two lines replace the old page content with the
   contents of the ``body`` text area from the form, and then
   update the page stored in the database.  The third line
   causes a response that redirects the browser to
   ``http://localhost:6543/FrontPage``.

.. _revisit:

Revisiting after authentication
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In this case, the user has an authentication cookie set in their
browser that specifies their login as ``'editor'``.  The
requested URL is ``http://localhost:6543/FrontPage/edit_page``.
   
This process requires two request/response cycles.

1. The user clicks :guilabel:`Edit page`.  The view callable is
   ``views.edit_page``.  The response is ``edit.pt``, showing
   the current page content.   

2. The user edits the content and clicks :guilabel:`Save`.
   The view callable is ``views.edit_page``.  The response is
   a redirect to ``/Frontpage``.

Cycle 1:

#. The route with pattern ``/{pagename}/edit_page`` matches the
   URL, and because of the authentication cookie, ``groupfinder``
   returns a list containing the ``group:editors`` principal,
   which ``models.RootFactory.__acl__`` uses to grant the
   ``edit`` permission, so this route matches and dispatches
   to the view callable :meth:`views.edit_page`.

#. In ``edit_page``, because the request did not come from a form
   submission, ``request.params`` has no key for
   ``'form.submitted'``.

#. The variable ``logged_in`` is set to  the login name
   ``'editor'`` by calling ``authenticated_userid``, which
   extracts it from the authentication cookie.

#. The function returns this dictionary::

    {'page':page,
     'save_url':'http://localhost:6543/FrontPage/edit_page',
     'logged_in':'editor'}

#. Template :file:`edit.pt` is rendered with the values from
   that dictionary.  Because of the presence of the
   ``'logged_in'`` entry, a :guilabel:`Logout` link appears.

Cycle 2:

#. The user edits the page content and clicks :guilabel:`Save`.

#. The ``POST`` operation works as in :ref:`good_login`.

.. _logging_out:

Logging out
~~~~~~~~~~~

This process starts with a request URL
``http://localhost:6543/logout``.

#. The route with pattern ``'/logout'`` matches and dispatches
   to the view callable ``logout`` in :file:`login.py`.

#. The call to :meth:`pyramid.security.forget` returns a list of
   header tuples that will, when returned with the response,
   cause the browser to delete the user's authentication cookie.

#. The view callable returns an ``HTTPFound`` exception that
   redirects the browser to named route ``view_wiki``, which
   will translate to URL ``http://localhost:6543``.  It
   also passes along the headers that delete the
   authentication cookie.