Larry McCay created KNOX-3143:
---------------------------------

             Summary: Add authorization related metadata to the issuance of 
CLIENT_ID and CLIENT_SECRET
                 Key: KNOX-3143
                 URL: https://issues.apache.org/jira/browse/KNOX-3143
             Project: Apache Knox
          Issue Type: Improvement
          Components: Server
            Reporter: Larry McCay
            Assignee: Larry McCay
             Fix For: 2.2.0


Current support for CLIENT_ID and CLIENT_SECRET for a client credentials flow 
leaves authorization up to policies and/or ACLs setup specifically for the 
client_id with some optional metadata available for searching and filtering 
tokens based on user name, comments, arbitrary tags.

We can probably do better than this and potentially add some additional 
identity characteristics to the client_id that could at least be used within 
audit logs.

My initial thinking around authorization and scopes was centered on the 
credentials representing some external user for which policies can be 
explicitly written.

I am revisiting this context to include AI Agents and/or MCP Servers. While 
these tools may be leverage by an individual, they shouldn't necessarily have 
the same permissions as the individual. This is where the RBAC notion of user 
being applied to agents starts to break down.

A user that has clearance for accessing certain resources themselves should NOT 
delegate that clearance to an agent that may make arbitrary decisions as to 
where to access it from or send it to. Therefore, we should add the notion of 
scopes to constrain what tools are able to do in the context of an extension of 
the user's identity.

This will require us to consider scopes within service level authorization 
within the Knox Gateway as well as an endpoint from which downstream components 
can look up the scopes for authorization decisions by the PEPs within the 
platform.





--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to