Hey Alex,

Thanks for the feedback.  Triplesec is a brilliant (Nice foresight), and I'm sure it will 
get plenty of traction.  One of my goals, in addition to freeing up more time to 
contribute, is to understand it better so that when bouncing around on SSO mailing lists, 
Tuscany (Policy management), etc. and see posts that might be related, I can say 
"Check out Triplesec!".  So tying it to usage scenarios like Google apps ,etc. 
helps.  In general most of the discussions I see are scenarios where someone has a 
resource:

So it sounds like Google (Hypothetically) would most likely front Triplesec with Google 
SSO, so Google SSO would use their AuthenticationHandler to authenticate Tina against her 
account stored in ADS on the host triplesec.google.com.  Then if that works out Tina gets 
a ticket and gets to see her mail, spreadsheets, etc. at 
host1.google.com/tina/spreadsheet?sheet=firstOne. Then Tina wants to see Joe's spreasheet 
on host2.google.com/joe/spreadhset?sheet=joeSheet.  So she clicks on that link.  
host2.google.com gets Tina's sso cookie, and sends it to triplesec at 
http://triplesec.google.com/authorization.  Triplesec then checks the cookie and figures 
out that it's Tina.  Then it looks to see if Tina is in any of the groups that Joe 
configured for the resource host2.google.com/joe/spreadhset?sheet=joeSheet.  It sees that 
Tina is indeed in the group, and sends a "Goahead" back to host2.google.com 
saying send the resource, but make it read only.

In this type of scenario there would be a triplsec application filter that's 
responsible for intercepting any requests made to the application (Server 
spreadsheet application host), asking triplesec first if it's cool, and then 
notifying the application of the triplesec authorization decision + any policy 
constraints with respect to read, write, etc.  Another aspect to it would be  
dividing up the spreadsheet into sections.  So Tina's authorization scope is 
rows 1-5, and the rest of the spreadsheet is off limits...Which would require a 
custom schema and authorization protocol, since it could be for lines 1-5 in 
the spreadsheet, or slides 10-15 in the presentation application, etc.

OK - I'll stop there before I exceed googles mail size limit. I know you have sore wrists, etc. and greatly appreciate your dedication, so I tried to write as much as possible, in order to make it easy to comment.
Thanks,
- Ole











Alex Karasulu wrote:
Sorry for taking so long to respond I was dealing with a computer catastrophe here for the past few days. More inline ...

On Feb 7, 2008 1:21 PM, Jesse McConnell <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:

    oh goodie, I have been waiting/lurking for some triplesec material
    to crop up on this list since talking to david jencks at apachecon :)


I've been researching this for some time now (years) and I think the schema for what we need in terms of the proper resolution to support things like exposing policy via XACML and other policy expression languages is pretty clear.

I would like to carve out a IETF draft specifically for this and implement it here after having experimented with previous ideas in Triplesec.

We've had many conversations with David on this list and I think we have resolved some of our differences. It's only a matter now of siting down and writing the schema.

    in general there seems to be a shortage of actual open source role
    based access control implementations so any offering in this regard
    is good for triplesec and apacheds...I am hoping to swap out the
    rbac implementation in redback (underlying user manglement solution
    in use for continuum and archiva in mavenlands) with something a
    little more standard and bullet proof.


Excellent. Your feedback will be most welcome and furthermore your welcome to join us in Triplesec development if you find the time and are interested.


    On Feb 7, 2008 12:12 PM, Ole Ersoy <[EMAIL PROTECTED]
    <mailto:[EMAIL PROTECTED]>> wrote:

        Hey Guys,

        I was just reading through this article:

        http://news.yahoo.com/s/nm/20080207/wr_nm/google_team_software_dc_1

        and thought of triplesec.  From 50K feet (OK maybe a little
        lower) it sounds like Triplesec would be the ideal solution for
        managing (create, read, write, execute, etc.) groups of
collaborators working on different documents.

Absolutely. We have been trying to get there but there are a few things we need in ADS to support efficient application of policy in an ACDF (Access Control Decision Function).

We are also thinking of using this schema in combination with another authorization schema based on subschema in addition to the basic authorization supported by ApacheDS today.

Also I think this is a great place for us to collaborate with the OpenLDAP folks like Howard et. al.

        All the users could be stored in ADS, along with the locations
        of user documents, and the users could then just assign
        permissions using the role based hierarchy discussed.


Yep that's the idea. We'll get there. We just need more hands on people, time and support.
         This seems to be a hot area for Google Apps, and thus
        presumably others will follow suit, and if triplesec were
        positioned as the right solution for this it could be good for
        all of ADS as a whole.


Indeed.

Thanks for the post Ole & Jesse. Let me know if you guys have any other questions or are interested in chipping away at some of our issues.

Regards,
Alex

Reply via email to