How to build user authentication into your gen AI app-accessing database

Generative AI agents introduce immense potential to transform enterprise workspaces. Enterprises from almost every industry are exploring the possibilities of generative AI, adopting AI agents for purposes ranging from internal productivity to customer-facing support. However, while these AI agents can efficiently interact with data already in your databases to provide summaries, answer complex questions, and generate insightful content, concerns persist around safeguarding sensitive user data when integrating this technology.

The data privacy dilemma

Before discussing data privacy, Google should define an important concept: RAG (Retrieval-Augmented Generation) is a machine-learning technique to optimize the accuracy and reliability of generative AI models. With RAG, an application retrieves information from a source (such as a database), augments it into the prompt of the LLM, and uses it to generate more grounded and accurate responses. 

Many developers have adopted RAG to enable their applications to use the often-proprietary data in their databases. For example, an application may use a RAG agent to access databases containing customer information, proprietary research, or confidential legal documents to correctly answer natural language questions with company context. 

A RAG use- case: Cymbal Air

Like any data access paradigm, without a careful approach there is risk. A hypothetical airline we’ll call Cymbal Air is developing an AI assistant that uses RAG to handle these tasks:

This assistant needs access to a wide range of operational and user data, and even potentially to write information to the database. However, giving the AI unrestricted access to the database could lead to accidental leaks of sensitive information about a different user. How do we ensure data safety while letting the AI assistant retrieve information from the database? 

A user-centric security design pattern

One way of tackling this problem is by putting limits on what the agent can access. Rather than give the foundation model unbounded access, we can define specific tool functions that the agent uses to access database information securely and predictably. The key steps are:

In essence, we designed the authentication system based on the usage of user-authenticated tool functions that is opaque to the foundation model agent.

Authentication and workflow

Let us take a look at the authentication workflow:

  1. Obtain a user authentication token
    1. The application requests user login and receives an authentication token from the authentication service.
    2. The application attaches the user’s authentication token to the tool function’s request headers.
  2. Send a request to the retrieval service
    1. The user asks the agent for information from the database.
    2. The agent uses the tool functions to send requests to the retrieval service.
  3. Verify the authentication token and query the database
    1. The retrieval service parses the user authentication token from the request header.
    2. The retrieval service verifies the user authentication token and receives the user ID from the authentication service.
    3. The retrieval service uses the user ID (not visible to the user or the foundation model agent) to query the database to get the user information.
  4. Send information back to the agent
    1. The application gets a response from the retrieval service containing the user information
    2. The application feeds the user information to the foundation model.
    3. The agent responds to the application, which forwards response to the user.

Why is this authentication design safer?

Throughout the entire process, the AI agent can never see every user’s data at once–instead, it only has access to the rows relevant to the authenticated user. In this way, each user gets a dedicated AI assistant, which only has access to that logged-in user’s information.

Building the app

Let’s explain how we can build an app with such a user authentication feature. There are two main components:

Implement user authentication feature

Application layer

Below is a  code example of one approach to construct Tool requests in LangChain. The Tools should be created in the application layer.

  1. Create a ‘get_id_token()’ function that sends a request to the authentication server to retrieve the user’s authentication token.
  2. Attach the user authentication token to the request header.
  3. Generate a LangChain Tool from the user-authenticated `list_ticket()` function.
def get_id_token():
    ... # Step 1
    return id_token
    
def get_headers(client: aiohttp.ClientSession):
    """Helper method to generate ID tokens for authenticated requests"""
    headers = client.headers
    headers["User-Id-Token"] = f"Bearer {get_id_token()}"
    return headers
def generate_list_tickets(client: aiohttp.ClientSession):
    async def list_tickets():
        response = await client.get(
            url=f"{BASE_URL}/tickets/list",
            headers=get_headers(client), # Step 2
        )
        response = await response.json()
        return response
    return list_tickets
# Step 3
list_ticket_tool = StructuredTool.from_function(
coroutine=generate_list_tickets(client),
name="List Tickets",
description="""
Use this tool to list a user's flight tickets.
Takes no input and returns a list of current user's flight tickets.
""",
)

Retrieval service

The receipt endpoint in the retrieval service processes requests from the application layer in the following steps:

  1. Parse the user authentication token from the request header
  2. Verify the token with the authentication service to get the user ID
  3. Send predefined a SQL query to retrieve the user’s information from the database
  4. Return the results to the application
async def get_user_info(request):
headers = request.headers
# Step 1
token = _ParseUserIdToken(headers)
# Step 2
id_info = id_token.verify_oauth2_token(token, requests.Request())
return {"user_id": id_info["sub"],}
@routes.get("/tickets/list")
async def list_tickets(request: Request):
user_info = await get_user_info(request)
if user_info is None:
raise HTTPException(status_code=401,
detail="User login required for database access.",)
    
    # Step 3
async with self.__pool.connect() as conn:
            s = text("SELECT * FROM tickets WHERE user_id = :user_id")
            params = {"user_id": user_id,}
            results = (await conn.execute(s, params)).mappings().fetchall()
res = [models.Ticket.model_validate(r) for r in results]
# Step 4
return results

Bringing it to life: The Cymbal Air demo

During the whole workflow, this traveler’s ticket information is protected by this user authentication design, where the AI assistant’s memory and authentication token are both associated with the user login, therefore each user gets their own agent with their own set of authenticated tools.

Related posts

AI in software development: What you need to know

by Cloud Ace Indonesia
11 months ago

Four steps to managing your Cloud Logging costs on a budget

by Cloud Ace Indonesia
1 year ago

Introducing AI-powered risk summaries in Security Command Center

by Cloud Ace Indonesia
1 year ago