Hi:
Thanks for the rapid reply.
Is there another way to do the same thing? That is, provide some form of
authentication for the requests for host/service certificates, while keeping
the request of user certificates open.
Or maybe I am thinking about it all wrong, and there are completely
different (better?) ways of doing the same thing.
Roger
Massimiliano Pala-3 wrote:
>
> Hello Roger,
>
> unfortunately I have to say that the issue has not been addressed. This
> is for many reasons, actually.
>
> Because of the problems exposed here, I decided to provide a more
> fine-grained
> access support with the next releases of OpenCA. The problem I am facing
> at the moment is the lack of spare time to dedicate to the project
> (strangely
> enough, we do not have any supporters at the moment.. so, it is all
> voluntary
> work!).
>
> The idea is to have a per-user *and* per-role fine-grained access control
> system that is accessible from within the single commands to allow the
> type
> of operations listed in this email.
>
> Because of this, there are several new commands that need to be added to
> the RA/CA interfaces that will allow for users management. This is a lot
> of work, unfortunately.
>
> Don't expect the solution to be ready soon, there's a lot of "meat" on the
> fire at the moment and not many resources available.. of course, if there
> are some people who would like to volunteer... :D
>
> Cheers,
> Max
>
>
> On 08/19/2010 02:32 PM, RogerImpey wrote:
>> Hi: Was this post's question answered? I have exactly the same problem.
>> Is there a good way around? Roger
>>
>> Arsen Hayrapetyan wrote:
>> Hi all (especially developers), Long ago I posted a question about
>> restriction of access to parts of the openca interfaces. There was
>> no solution to it. I am trying to do this with RBAC, but the system
>> is too rigid. The problem is following. I have two web-pages on my
>> openca Public interface: 1) Page for users to request certificates
>> 2) Page for administrators to request certificates for their hosts
>> The first page is of public access, everybody can send a request for
>> user certificate. However, the second page should be available to
>> those users only (administrators), who posess valid user certificate
>> from my CA. This is a common practice: to oblige host certificate
>> requesters to have already the certificate from the given CA. I
>> tried to use OpenCA RBAC mechanism to restrict access to the second
>> page. For that I added a separate command HostCSR(basically the copy
>> of basic_csr script for CSR generation) and modified
>> rbac/acl.xml.template file to have the following:
>> =============================================================
>> (0|@pub_module_id@) .* csr new .* (0|@pub_module_id@) User csr new
>> for hosts or services .*
>> ============================================================= As one
>> can see everybody (regardless of the role assigned to their
>> certificate/login name) is allowed to execute basic_csr script
>> (first part), and only those with 'User' role are allowd ro execute
>> the HostCSR (second part). Now when I log in with my User
>> certificate (which is issued by my CA, registered with database on
>> Public interface node, and has the role 'User' assigned), my
>> certificate IS NOT retrieved from database and the role assigned to
>> it IS NOT changed, because in access_control/pub.xml file which
>> controls the authentication method for the interface I have
>> ====================== none ====================== Apparently, I
>> cannot have other authentication method because I need UNRESTRICTED
>> access to user certificate request page. Later when it comes to
>> execution of HostCSR command, the system examins the acl.xml file,
>> fetches the role 'User' and compares it with the role of host
>> certificate requester, which is EMPTY. As a result I have:
>> "Permission denied" error. In fact the access control is controlled
>> on the interface level (pub, ra, node), not at the level of
>> commands. This is too rigid. What developers think about making
>> access control more fine-grained? I would appreciate also any
>> solution to this problem (currently I am implementing one: getting
>> the DN of certificate which user uses to access the host CSR
>> generation page from apache, searching for it in the database, check
>> the role of the certificate found and granting access to the page,
>> if the role is 'User'. But this solution is clumsy. I would like
>> more light-weight one.) I am asking specially implementers of openca
>> RBAC system not to ignore this e-mail. Thanks, Arsen.
>>
>> -------------------------------------------------------------------------
>> This SF.net email is sponsored by: Microsoft Defy all challenges.
>> Microsoft(R) Visual Studio 2005.
>> http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
>> _______________________________________________ Openca-Users mailing
>> list [email protected]
>> https://lists.sourceforge.net/lists/listinfo/openca-users
>>
>>
>> ------------------------------------------------------------------------
>> View this message in context: Re: Role-based access control (RBAC)
>> system of OpenCA is too strict
>> <http://old.nabble.com/Role-based-access-control-%28RBAC%29-system-of-OpenCA-is-too-strict-tp12642086p29485118.html>
>> Sent from the openca-users mailing list archive
>> <http://old.nabble.com/openca-users-f3692.html> at Nabble.com.
>>
>>
>>
>> ------------------------------------------------------------------------------
>> This SF.net email is sponsored by
>>
>> Make an app they can't live without
>> Enter the BlackBerry Developer Challenge
>> http://p.sf.net/sfu/RIM-dev2dev
>>
>>
>>
>> _______________________________________________
>> Openca-Users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/openca-users
>
>
> --
>
> Best Regards,
>
> Massimiliano Pala
>
> --o------------------------------------------------------------------------
> Massimiliano Pala [OpenCA Project Manager]
> [email protected]
>
> [email protected]
>
> Dartmouth Computer Science Dept Home Phone: +1 (603)
> 369-9332
> PKI/Trust Laboratory Work Phone: +1 (603)
> 646-8734
> --o------------------------------------------------------------------------
> People who think they know everything are a great annoyance to those of us
> who do.
> -- Isaac Asimov
>
>
>
> ------------------------------------------------------------------------------
> This SF.net email is sponsored by
>
> Make an app they can't live without
> Enter the BlackBerry Developer Challenge
> http://p.sf.net/sfu/RIM-dev2dev
> _______________________________________________
> Openca-Users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/openca-users
>
>
--
View this message in context:
http://old.nabble.com/Role-based-access-control-%28RBAC%29-system-of-OpenCA-is-too-strict-tp12642086p29485612.html
Sent from the openca-users mailing list archive at Nabble.com.
------------------------------------------------------------------------------
This SF.net email is sponsored by
Make an app they can't live without
Enter the BlackBerry Developer Challenge
http://p.sf.net/sfu/RIM-dev2dev
_______________________________________________
Openca-Users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openca-users