On Dec 28, 2006, at 8:23 AM, Alex Karasulu wrote:

David Jencks wrote:
Right now triplesec is basically using strings as permissions, and they
are stored as multi-valued attributes like so:

objectclass ( 1.2.6.1.4.1.22555.1.1.1.4.203 NAME 'policyRole'
    SUP top
    AUXILIARY
    MUST ( roleName )
    MAY  ( grants $ denials $ description ) )

objectclass ( 1.2.6.1.4.1.22555.1.1.1.4.204 NAME 'policyProfile'
    SUP top
    AUXILIARY
    MUST ( profileId $ user )
    MAY  ( grants $ denials $ roles $ userPassword $ description $
safehausDisabled ) )


or as a bit of ldif:

dn:
roleName=mockRole5,ou=roles,appName=mockApplication,ou=applications,d c=example,dc=com

objectClass: top
objectClass: policyRole
grants: mockPerm9
grants: mockPerm7
grants: mockPerm5
grants: mockPerm4
denials: mockPerm6
roleName: mockRole5

(this includes my local modification so roles can have denials).

FYI now with denials in roles the set wise calculation of effective
permissions will need to account for denials in roles. This also brings
about the issue of permission precedence since some denials may now
clash with grants. A policy around how this will be handled is needed.

I figure that in guardian both role and policy need a grant Permissions and a deny Permissions. For either one, a permission is implied if the grant Permissions implies it AND the denies Permissions doesn't imply it

grants.implies(p) && !denies.implies(p)



After looking around at java.security.Permissions I think we can store
99% of them with 3 strings:
className
permissionName
action

I think we can create a special permission type (objectClass) called a
javaPermission that adds the extra className and action attributes:
permissionName is already present.  This new javaPermission basically
extends the existing string permission objectClass.

I think it makes more sense to model the existing string permissions as a kind of java permission and look for a good datamodel for java permissions.

and possibly depending on how ldap datamodels work
grant/deny

Why would you add a grant and deny attribute to a permission?

Within a role or profile, these 3 or 4 strings are needed to get a
unique permission.

Ahh ok I see the confusion.  You mean a grant or deny on a Role or a
Profile and not in the permission object itself.

Basically the Role or Profile (in ldap) will refer to the permission
that it grants or denies.  In the API there may be a reference to the
actual Permission object.

I've been trying to learn about ldap schemas, the data model, ldif, etc by figuring out how to fit this info into ldap but I'm pretty bewildered and maybe someone with non-zero experience could review and improve my
suggestion below or suggest how to proceed.

No problem let me take a look ...

It looks to me as if one way to proceed would be to have the className
with permissionNames grouped under each labelled grant or deny, then
with the actions as attributes on the permission.  Does the following
schema do this?

attributetype ( 1.2.6.1.4.1.22555.1.1.1.3.abc
        NAME 'action'
        DESC 'action for a permission'
        EQUALITY caseExactMatch
        SUBSTR caseExactSubstringsMatch
        SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )

Ok defining an action attribute ... this looks ok minus the need for a
good OID. Also you might want the attribute to be actions (plaural) if
it can be multivalued?

objectclass ( 1.2.6.1.4.1.22555.1.1.1.4.abc NAME 'className'
    SUP top
    AUXILIARY

objectclass ( 1.2.6.1.4.1.22555.1.1.1.4.def NAME 'grant'
    SUP top
    AUXILIARY
    MAY  ( action )

objectclass ( 1.2.6.1.4.1.22555.1.1.1.4.ghi NAME 'deny'
    SUP top
    AUXILIARY
    MAY  ( action )

Hmmm this is not a good idea. I would design the grants and denials as
attributes that can be included within the objectClass of a Role and a
Profile.  These attributes should just associate a permission with the
Role or Profile as would a foreign key into another table in RDBMS land.

So let's say you define a ldap objectClass called javaPermission for
your permission like so:

objectclass ( TBD NAME 'javaPermission'
        SUP policyPermission
        AUXILIARY
        MUST ( className )
        MAY ( action )

I'm imagining a dn something like

grant=/servlet/ *,permissionClass=javax.security.jacc.WebResourcePermission,roleName= peon,applicationName=foo,....

Hmmm I think you may have a slight missunderstanding on how to use a DN
in designing the directory.  NP though I don't think we need to mess
with the directory's hierarchy that much. The organization we have will
work.

with attributes like
action=POST,GET
action=INDEX

Ok you need to make action into a multivalued attribute and perhaps call
it actions but your whole view of how to organize the DIT needs some
work.  Let's take it step by step.  For now our current structure is
well formulated which in turn effects the DN used.  Just keep in mind
the DN is merely like a primary key for looking stuff up.  So when you
look up a permission the DN need not have all the aspects of the
permission listed within it.

If the permission name uniquely identifies the permission within a
context of the system then we can simply keep that permission under a
context and use the permission name as the relative name of the
permission entry.

Does this make sense?

Not entirely.

First of all, I don't think I explained one of my thoughts, which is that keeping a list of all permissions used in an application doesn't really have any value. In general there's an infinite set of possible permissions for an application and there's no practical way to enumerate all of them. To my eyes the only thing the permissions are currently used for is to construct the admin role, and this is not something that is generally useful: it certainly has no universal definition in jacc or j2ee. I would prefer to have some button on a gui to collect all the permissions in defined roles and profiles and add them to a particular role (or profile)

Assuming you agree with this, we will be storing permissions associated with role and profile. To construct a permission instance we need:

permission class
permission name
permission action
grant/deny

In relational terms, these are all part of the primary key. IIUC to directly express this in ldap you get dns with something like a=foo +b=bar+c=baz,ou=groupId,....... which I have not yet seen in practice and looks confusing to me. I thought it would be easier to deal with if instead we treated it as several levels:

role or profile

permission class

[grant,deny]= permission name
with actions as a multivalued attribute for the permission name.

This results IIUC in the ldif to install a StringPermission with no actions looking something like:


dn: roleName=mockRole1,ou=roles,appName=mockApplication,ou=applications,dc=e xample, dc=com
objectClass: top
objectClass: policyRole
roleName: mockRole1

dn: permClassName=org.safehaus.triplesec.guardian.StringPermission, roleName=mockRole1,ou=roles,appName=mockApplication,ou=applications,dc=e xample, dc=com
objectClass: top
objectClass: permClass
permClassName: org.safehaus.triplesec.guardian.StringPermission

dn: grant=mockPerm0, permClassName=org.safehaus.triplesec.guardian.StringPermission, roleName=mockRole1,ou=roles,appName=mockApplication,ou=applications,dc=e xample, dc=com
objectClass: top
objectClass: permGrant
grant: mockPerm0

It might be clearer to look at the schema and code to handle this in guardian-ldap and admin-api in sandbox/triplesec-jacc. It's entirely possible I've missing something basic and there's a better way to handle this.... but (obviously :-) I haven't seen it yet.


Some of my other questions are...  AUXILIARY or STRUCTURAL?

AUXILIARY is best I would warn against using STRUCTURAL objectClasses in
general but sometimes you have to.  Here I think we may need to use
STRUCTURAL objectClasses for permissions when we really used AUXILIARY. This is because an entry needs at least one STRUCTURAL objectClass. An
entry can have any number of AUXILIARY objectClasses.

This would take too long to explain but here's the gist of it in a
manner easily understood by Java programmers ...

ObjectClasses are like Java classes and Interfaces. Certain inheritance
rules are similar.  AUXILIARY objectClasses are like interfaces, where
an entry can actually have several AUXILIARY objectClasses in use for
it.  STRUCTURAL objectClasses are like concrete classes where an entry
can really have only one STRUCTURAL objectClass.  An entry must have a
STRUCTURAL objectClass defined for it.

An ABSTRACT objectClass is like an abstract Java class.  You cannot
create an object from and ABSTRACT objectClass and hence you cannot have
an entry with just an ABSTRACT objectClass.

What if anything ties the object classes together in a tree, so e.g.
grant and deny occur "inside" className? Should there be MAY ( grant $
deny) in the className objectclass?

I think you are confusing a few concepts. The structure of the tree is
governed by other kinds of complex schema constructs like
dITStructureRules and nameForms however we need not talk about these
right now.

The actions and possibly the grant/deny are likely to have lots of
bizarre punctuation, such as the commas in the example above. How does
one deal with that in ldap?

This is not a problem unless we start using those attributes within the DN of the entry which we should not. Basically the syntax of the action
attribute will determine the valid values for these attributes that we
define.

I think that the permission name (which I am thinking will be more or less as it is today modelled as grant=permissionName or deny=permissionName) can also have bizarre punctuation and need to be part of a dn. Maybe you can find some other way.... I sure haven't seen how to associate a set of values except using an objectclass.

Many thanks for any help, and I hope this isn't too much of a user list
question :-)

No problem at all.  Let's just step carefully on some of your changes
until we all have a grasp of what they entail overall wrt schema changes
and other things they will impact.

I think hammering this out in the sandbox will be a good idea.

many thanks
david jencks


Alex
<akarasulu.vcf>

Reply via email to