Cloudinary Blog

Protecting images and videos via cookie-based authentication

How To Use Cookie-Based Authentication to Protect Visual Media

Controlling who can access your images and videos, and when, can be an important concern for your business and security workflow. You may have resources that you only want some of your users or employees to access, or you may need to make sure that your original resources are secure, and only transformed (edited) versions of your resources are delivered, e.g., with a watermark or logo displayed.

Cloudinary prides itself on the wide range of manipulations available via dynamic URLs, and there are huge benefits to using on-the-fly dynamic manipulations to deliver your public resources. But this flexibility for delivering resources may be too permissive in certain situations because simply changing or removing a dynamic Cloudinary URL parameter can deliver a new image on-the-fly. This can result in users tweaking a URL in order to access the original version of images, for example to view an image without the added watermark, minus the cropping parameters that have isolated a specific face in the image, or without the pixelate_faces effect hiding people's identity, etc.

To provide more control over access to your images, Cloudinary offers out-of-the-box support for uploading resources as authenticated. By default, these authenticated resources can only be accessed with a signed delivery URL: a dynamic URL with a signature that must be validated before the resource is delivered. The signature is based on all the dynamic parameters included in the URL, so changing any parameter or value in the URL will invalidate the signature and thus access to the requested resource will be denied.

Webinar
Marketing Without Barriers Through Dynamic Asset Management

An example of the single line of code needed for uploading an image as authenticated:

Ruby:
Copy to clipboard
Cloudinary::Uploader.upload("bag.jpg", 
    :type => :authenticated)
PHP:
Copy to clipboard
\Cloudinary\Uploader::upload("bag.jpg", 
    array("type" => "authenticated"));
Python:
Copy to clipboard
cloudinary.uploader.upload("bag.jpg", 
    type = "authenticated")
Node.js:
Copy to clipboard
cloudinary.v2.uploader.upload("bag.jpg", 
    { type: "authenticated" }, 
    function(error, result) {console.log(result); });
Java:
Copy to clipboard
cloudinary.uploader().upload("bag.jpg", 
    ObjectUtils.asMap("type", "authenticated"));

An example of the single line of code needed to deliver an authenticated image (also scaled to a width of 300 pixels). Note the signature component in the resulting URL (automatically added when using our SDKs):

Ruby:
Copy to clipboard
cl_image_tag("bag.jpg", :width=>300, :crop=>"scale", :sign_url=>true, :type=>"authenticated")
PHP:
Copy to clipboard
cl_image_tag("bag.jpg", array("width"=>300, "crop"=>"scale", "sign_url"=>true, "type"=>"authenticated"))
Python:
Copy to clipboard
CloudinaryImage("bag.jpg").image(width=300, crop="scale", sign_url=True, type="authenticated")
Node.js:
Copy to clipboard
cloudinary.image("bag.jpg", {width: 300, crop: "scale", sign_url: true, type: "authenticated"})
Java:
Copy to clipboard
cloudinary.url().transformation(new Transformation().width(300).crop("scale")).signed(true).type("authenticated").imageTag("bag.jpg");
JS:
Copy to clipboard
cloudinary.imageTag('bag.jpg', {width: 300, crop: "scale", signUrl: true, type: "authenticated"}).toHtml();
jQuery:
Copy to clipboard
$.cloudinary.image("bag.jpg", {width: 300, crop: "scale", type: "authenticated"})
React:
Copy to clipboard
<Image publicId="bag.jpg" signUrl="true" type="authenticated">
  <Transformation width="300" crop="scale" />
</Image>
Vue.js:
Copy to clipboard
<cld-image publicId="bag.jpg" signUrl="true" type="authenticated">
  <cld-transformation width="300" crop="scale" />
</cld-image>
Angular:
Copy to clipboard
<cl-image public-id="bag.jpg" sign-url="true" type="authenticated">
  <cl-transformation width="300" crop="scale">
  </cl-transformation>
</cl-image>
.Net:
Copy to clipboard
cloudinary.Api.UrlImgUp.Transform(new Transformation().Width(300).Crop("scale")).Signed(true).Type("authenticated").BuildImageTag("bag.jpg")
Android:
Copy to clipboard
MediaManager.get().url().transformation(new Transformation().width(300).crop("scale")).signed(true).type("authenticated").generate("bag.jpg");
iOS:
Copy to clipboard
imageView.cldSetImage(cloudinary.createUrl().setType( "authenticated").setTransformation(CLDTransformation().setWidth(300).setCrop("scale")).generate("bag.jpg", signUrl: true)!, cloudinary: cloudinary)

The signed delivery method described above may meet your authentication needs in many cases, but what if you want to limit access to your resources to a particular IP address, or to specific users, or for a limited time until they are released? In order to support more advanced requirements for authentication, Cloudinary has added new authentication functionality:

  • Token-based authentication, providing IP restrictions and time-limited URLs.
  • Cookie-based authentication, restricting access to users with a valid cookie.

Token-based authentication

When you need to control which devices have access to an image, the basic signed URL solution may not be enough.

Suppose you have images of products that have not been released yet, or user uploaded images that should not be publicly available (e.g., signed contracts). In this case, you would want to allow access only for your employees, or in effect, restrict requests to only those that have been initiated from within your network (a static IP address). That’s where token-based authentication comes in.

An authentication token is added as a set of query parameters to the image delivery URL, and is used for validation before delivering the image. Generating the token-based authentication URL is as simple as adding the sign_url parameter (set to true) and the auth_token parameter in your SDK resource delivery method. The auth_token parameter includes the details that limit access, which in our example would include values for the permitted ip and the encryption key you receive from Cloudinary.

For example, to deliver the "contract123" image only if the requesting IP address is 22.33.22.11:

Ruby:
Copy to clipboard
cl_image_tag("contract123.jpg", :sign_url => true, :auth_token => { 
  :key => "MyKey", :ip => "22.33.22.11"}, :type => "authenticated")
PHP:
Copy to clipboard
cl_image_tag("contract123.jpg",  array("auth_token" => array(
  "key" => "MyKey",  "ip" => "22.33.22.11"), "type" => "authenticated",  
  "sign_url" => true));
Python:
Copy to clipboard
cloudinary.CloudinaryImage("contract123.jpg").image(
  type = "authenticated", auth_token = dict(ip = "22.33.22.11", 
  key = "MyKey"), sign_url = true)
Node.js:
Copy to clipboard
cloudinary.image("contract123.jpg",  { type: "authenticated",  
  auth_token: {key: "MyKey", ip: "22.33.22.11" }, sign_url: true })
Java:
Copy to clipboard
cloudinary.url().transformation(new Transformation().
  type("authenticated").authToken(new AuthToken("MyKey").
  ip("22.33.22.11").signed(true)).imageTag("contract123.jpg");

Cookie-based authentication

What if you also need fine-grained control over not only the device accessing specific resources or when they are available, but also the specific person or people accessing them?

For example, let’s say you are developing a website that has a membership-only section for registered users. The registered users have access to images and videos that should not be available to your 'regular' visitors. You also want to grant access for up to 1 hour while ensuring that your registered users can't just share an image URL with non-members. In this case you will want to use the cookie-based authentication feature, which expands on the functionality of token-based authentication, enabling you to limit the delivery of authenticated images only to users with a valid cookie. The validity of the cookie can be matched with the user's session expiration and can include an Access Control List (ACL) for configuring the URL path where the cookie can be used (e.g., /image/authenticated/*). As with token-based authentication, you can also limit the cookie by IP address and/or time.

In the example above, when a user logs in to the membership section of your website, you would generate a cookie for the user that allows him to view your "authenticated" images. But if anyone without the cookie tried to open the same image URL they would get an error.

Example: To create a cookie that is valid for 60 minutes, allows access to all of your authenticated images, and is signed with MY_KEY:

Copy to clipboard
tokenOptions  =  { 
  :key => "MY_KEY", 
  :duration => 3600, 
  :acl => "/image/authenticated/*"
}
cookieToken = Cloudinary::Utils.generate_auth_token(tokenOptions)

Cookies with transformations

The flexibility of cookie-based authentication also provides a means for customizing the access for every user that logs into your system. As Cloudinary uses dynamic URLs to deliver your resources, the Access Control List path in the cookie can include transformations that are custom-tailored with details specific to your company, for example, adding the company logo as an overlay on an image (e.g., /image/authenticated/l_logo.png/*). That means that the cookie can only be used to authenticate URLs that include the given transformation.

For example, you could set the ACL in the cookie so that it authorizes all images with a width of 700 pixels and a company logo in the top right corner:

Copy to clipboard
:acl => "/image/authenticated/w_700/l_logo,g_north_east/*"

To simplify the effort, you can group any set of transformations as a named transformation and then simply add the named transformation to the ACL. For example, adding a named transformation called "authorized" to the ACL, where "authorized" has been set to the transformations mentioned above: (w_700/l_logo,g_north_east).

Copy to clipboard
:acl => "/image/authenticated/t_authorized/*"

Cookies and user-specific transformations

One of the potential drawbacks of delivering even authenticated images is the ease with which the recipient can simply save the image to their computer and potentially pass it on to anyone else. This can be especially problematic if your company needs specific people to view your resources, but the resources also need to be kept private from others for a variety of reasons, for example, images of pre-released products. To help safeguard against any "leaks", you can provide a means of tracing where the image originated.

Let’s say that John Doe is a product design manager. He needs to have access to all the images being prepared for a planned product release. Here's an example that allows authentication for any image as long as that person's name is added as a semi-transparent text overlay, repeated over the entire image.

Copy to clipboard
:acl => "/image/authenticated/a_-25,o_6,l_text:Arial_25_bold:" 
  + current_user + "/fl_tiled.layer_apply/*"

So the following image URL will be authenticated for John Doe, but not for any other user:

Copy to clipboard
https://res.cloudinary.com/demo/image/authenticated/a_-25,l_text:Arial_25_bold:John%20Doe,o_6/fl_tiled.layer_apply/w_800/cookies.jpg

authenticated overlay

Ruby:
Copy to clipboard
cl_image_tag("cookies.jpg", :sign_url=>true, :type=>"authenticated", :transformation=>[
  {:angle=>-25, :overlay=>{:font_family=>"Arial", :font_size=>25, :font_weight=>"bold", :text=>"John%20Doe"}, :opacity=>6},
  {:flags=>["tiled", "layer_apply"]}
  ])
PHP:
Copy to clipboard
cl_image_tag("cookies.jpg", array("sign_url"=>true, "type"=>"authenticated", "transformation"=>array(
  array("angle"=>-25, "overlay"=>array("font_family"=>"Arial", "font_size"=>25, "font_weight"=>"bold", "text"=>"John%20Doe"), "opacity"=>6),
  array("flags"=>array("tiled", "layer_apply"))
  )))
Python:
Copy to clipboard
CloudinaryImage("cookies.jpg").image(sign_url=True, type="authenticated", transformation=[
  {'angle': -25, 'overlay': {'font_family': "Arial", 'font_size': 25, 'font_weight': "bold", 'text': "John%20Doe"}, 'opacity': 6},
  {'flags': ["tiled", "layer_apply"]}
  ])
Node.js:
Copy to clipboard
cloudinary.image("cookies.jpg", {sign_url: true, type: "authenticated", transformation: [
  {angle: -25, overlay: {font_family: "Arial", font_size: 25, font_weight: "bold", text: "John%20Doe"}, opacity: 6},
  {flags: ["tiled", "layer_apply"]}
  ]})
Java:
Copy to clipboard
cloudinary.url().transformation(new Transformation()
  .angle(-25).overlay(new TextLayer().fontFamily("Arial").fontSize(25).fontWeight("bold").text("John%20Doe")).opacity(6).chain()
  .flags("tiled", "layer_apply")).signed(true).type("authenticated").imageTag("cookies.jpg");
JS:
Copy to clipboard
cloudinary.imageTag('cookies.jpg', {signUrl: true, type: "authenticated", transformation: [
  {angle: -25, overlay: new cloudinary.TextLayer().fontFamily("Arial").fontSize(25).fontWeight("bold").text("John%20Doe"), opacity: 6},
  {flags: ["tiled", "layer_apply"]}
  ]}).toHtml();
jQuery:
Copy to clipboard
$.cloudinary.image("cookies.jpg", {type: "authenticated", transformation: [
  {angle: -25, overlay: new cloudinary.TextLayer().fontFamily("Arial").fontSize(25).fontWeight("bold").text("John%20Doe"), opacity: 6},
  {flags: ["tiled", "layer_apply"]}
  ]})
React:
Copy to clipboard
<Image publicId="cookies.jpg" signUrl="true" type="authenticated">
  <Transformation angle="-25" overlay={{fontFamily: "Arial", fontSize: 25, fontWeight: "bold", text: "John%20Doe"}} opacity="6" />
  <Transformation flags={["tiled", "layer_apply"]} />
</Image>
Vue.js:
Copy to clipboard
<cld-image publicId="cookies.jpg" signUrl="true" type="authenticated">
  <cld-transformation angle="-25" overlay={{fontFamily: "Arial", fontSize: 25, fontWeight: "bold", text: "John%20Doe"}} opacity="6" />
  <cld-transformation flags={["tiled", "layer_apply"]} />
</cld-image>
Angular:
Copy to clipboard
<cl-image public-id="cookies.jpg" sign-url="true" type="authenticated">
  <cl-transformation angle="-25" overlay="text:Arial_25_bold:John%20Doe" opacity="6">
  </cl-transformation>
  <cl-transformation flags={{["tiled", "layer_apply"]}}>
  </cl-transformation>
</cl-image>
.Net:
Copy to clipboard
cloudinary.Api.UrlImgUp.Transform(new Transformation()
  .Angle(-25).Overlay(new TextLayer().FontFamily("Arial").FontSize(25).FontWeight("bold").Text("John%20Doe")).Opacity(6).Chain()
  .Flags("tiled", "layer_apply")).Signed(true).Type("authenticated").BuildImageTag("cookies.jpg")
Android:
Copy to clipboard
MediaManager.get().url().transformation(new Transformation()
  .angle(-25).overlay(new TextLayer().fontFamily("Arial").fontSize(25).fontWeight("bold").text("John%20Doe")).opacity(6).chain()
  .flags("tiled", "layer_apply")).signed(true).type("authenticated").generate("cookies.jpg");
iOS:
Copy to clipboard
imageView.cldSetImage(cloudinary.createUrl().setType( "authenticated").setTransformation(CLDTransformation()
  .setAngle(-25).setOverlay("text:Arial_25_bold:John%20Doe").setOpacity(6).chain()
  .setFlags("tiled", "layer_apply")).generate("cookies.jpg", signUrl: true)!, cloudinary: cloudinary)

This very identifying watermark can help ensure that John will not break company policy and share his image with others.

One tough cookie

Preventing unauthenticated access to your resources can be an important concern for a variety of reasons. With cookies you can take your authentication workflow to a whole new level of customizable access to your resources, including the flexibility to tailor the access on an individual basis for every authenticated user. For more detailed information on authenticating resources and implementing cookie-based authentication, see the documentation on authenticated access to media assets.

The new authentication functionality is currently available for our Enterprise customers and requires a small setup on Cloudinary's side. Contact us to enable these features for your account.

Cloudinary reduces the complexities of image manipulation, storage, administration and delivery and provides developers with an easy-to-use, end-to-end, cloud-based solution. Cloudinary enables developers to focus on creating their apps and presenting the best images possible. If you haven't tried Cloudinary yet, what are you waiting for? Visit our website to sign up for a free account.

Recent Blog Posts

Maya Shavin: How I Built My Website

Besides working as a senior front-end developer at Cloudinary, I'm also a content creator, a blogger, and an open-source developer. Follow me at @mayashavin and on mayashavin.com.

In the beginning, my website, mayashavin.com, was mainly for showcasing the status of my development projects and keeping me organized with my speaking schedule. Initially, I built it with Vue.js, later on switching to Nuxt.js (aka Nuxt) for a higher SEO score, and deployed it with Netlify. After some time, I added a blog section with Netlify CMS as the content management system (CMS). Everything was fine until I added more content and features, which led to a significant decline in the site’s performance. Also, the site design needed a modern look. So, I gave the site a makeover.

Read more
Automation Frees Up PetRescue’s Staff to Help Pets Find Their Forever Homes

As we spend more time at home, many of us are adopting pets for the joy, companionship and a surprising range of health benefits. In Australia, where our nonprofit customer PetRescue is located, there’s a shortage of pets to adopt. Last August, the Guardian reported that dog shelters in Australia emptied and adoption fees for puppies were running as high as $AUS1800.

Read more
Cloudinary and Contentful Make Modern Content Management Easier

I am pleased to share that Cloudinary and Contentful have joined forces to further streamline the creation, processing, and delivery of online content through Cloudinary’s digital asset management (DAM) solution and advanced transformation and delivery capabilities for images and video. What’s more, the partnership delivers a headless approach to DAM. By leveraging APIs for media management tasks, marketers and developers alike benefit from an integrated stack of optimized assets for optimization and automation. As a result, page loads are fast and beautiful, and at scale—with less overhead and effort.

Read more
Introducing Cloudinary's Nuxt Module

Since its initial release in October 2016 by the Chopin brothers as a server-side framework that runs on top of Vue.js, Nuxt (aka Nuxt.js) has gained prominence in both intuitiveness and performance. The framework offers numerous built-in features based on a modular architecture, bringing ease and simplicity to web development. Not surprisingly, Nuxt.js has seen remarkable growth in adoption by the developer community along with accolades galore. At this writing, Nuxt has earned over 30K stars on GitHub and 96 active modules with over a million downloads per month. And the upward trend is ongoing.

Read more
How Quality and Quantity can go Hand in Hand

When it comes to quality versus quantity, you’ll often hear people say, “It’s the quality that counts, not the quantity”. While that’s true in many situations, there are also cases where you want both quality and quantity. You may have thousands of images on your website and you want them all to look great. This is especially important if your website allows users to upload their own content, for example, to sell their own products or services. You don't want their poor quality images to reflect badly on your brand.

Read more