Had trailing whitespaces in it .. *sigh* So i'm further along now, but bumped into another problem. I have defined a rule with several allowed actions. One action is "urn:fedora:names:fedora:2.1:action:api-a" while the other actions are specific api-m methods. I assumed that specifiying the first would allow to use all api-a methods, but it seems i cannot.
Now the question is: is there actually some error in the policy, or is my assessment of the api-a action attribute incorrect? On 08.07.2011 18:03, thio wrote: > I could access it being logged in as another user which has a group. > Tried to add MustBePresent="false", but that didn't change the outcome. > > On 08.07.2011 17:53, Benjamin Armintor wrote: >> Are the unexpected Permit results coming when a user is logged in, has >> a fedoraRole, but it is not "administrator"? Or is it that no one is >> logged in/the logged in user has no fedoraRole? >> >> If the latter, the first thing I would try is adding >> MustBePresent="false" to your subjectAttributeDesignator. According >> to the spec: >> http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf >> >> it effectively default to "true", and returns an Indeterminate result >> in the event of a missing attribute. Quoting from the rule evaluation >> spec: >> "If the target value is "No-match" or “Indeterminate” then the rule >> value SHALL be “NotApplicable” or “Indeterminate”, respectively, >> regardless of the value of the condition. For these cases, therefore, >> the condition need not be evaluated." >> >> Since you have no condition, it may be applying that rule whenever the >> fedoraRole attribute is missing. >> >> On 7/8/11, thio<t...@uni-koblenz.de> wrote: >>> Hi! >>> >>> Recently i was asked to build Policies for Fedora Objects. >>> >>> I have looked at the policy writing guide, and so far doing it like THAT >>> works, but i find this style kind of convoluted. >>> >>> Since i only need simple rules i thought i could as well use the >>> "straightforward" way, which is closer to the datamodel i get. >>> >>> To give you an example, a policy that shuts everyone out but admins: >>> >>> _*-guide:*_ >>> <Policy PolicyId="demo" >>> RuleCombiningAlgId="urn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:first-applicable" >>> xmlns="urn:oasis:names:tc:xacml:1.0:policy" >>> xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"> >>> <Target> >>> <Subjects> >>> <AnySubject/> >>> </Subjects> >>> <Resources> >>> <Resource> >>> <ResourceMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> >>> <AttributeValue >>> DataType="http://www.w3.org/2001/XMLSchema#string">changeme:10061</AttributeValue> >>> <ResourceAttributeDesignator >>> AttributeId="urn:fedora:names:fedora:2.1:resource:object:pid" >>> DataType="http://www.w3.org/2001/XMLSchema#string"/> >>> </ResourceMatch> >>> </Resource> >>> </Resources> >>> <Actions> >>> <AnyAction/> >>> </Actions> >>> </Target> >>> <Rule Effect="Deny" RuleId="1"> >>> <Condition FunctionId="urn:oasis:names:tc:xacml:1.0:function:not"> >>> <Apply >>> FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-at-least-one-member-of"> >>> <SubjectAttributeDesignator AttributeId="fedoraRole" >>> DataType="http://www.w3.org/2001/XMLSchema#string" MustBePresent="false"/> >>> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-bag"> >>> <AttributeValue >>> DataType="http://www.w3.org/2001/XMLSchema#string">administrator</AttributeValue> >>> </Apply> >>> </Apply> >>> </Condition> >>> </Rule> >>> <Rule Effect="Permit" RuleId="3"/> >>> </Policy> >>> _* >>> -mine:*_ >>> <Policy PolicyId="changeme:10061:DenyAllDefaultPolicy" >>> >>> RuleCombiningAlgId="urn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:first-applicable"> >>> <Target> >>> <Subjects> >>> <AnySubject /> >>> </Subjects> >>> <Resources> >>> <Resource> >>> <ResourceMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> >>> <AttributeValue >>> DataType="http://www.w3.org/2001/XMLSchema#string">changeme:10059 >>> </AttributeValue> >>> <ResourceAttributeDesignator >>> >>> AttributeId="urn:fedora:names:fedora:2.1:resource:object:pid" >>> >>> DataType="http://www.w3.org/2001/XMLSchema#string" /> >>> </ResourceMatch> >>> </Resource> >>> </Resources> >>> <Actions> >>> <AnyAction /> >>> </Actions> >>> </Target> >>> <Rule RuleId="AdminRule" Effect="Permit"> >>> <Target> >>> <Subjects> >>> <Subject> >>> <SubjectMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> >>> <AttributeValue >>> DataType="http://www.w3.org/2001/XMLSchema#string">administrator >>> </AttributeValue> >>> <SubjectAttributeDesignator >>> AttributeId="fedoraRole" >>> DataType="http://www.w3.org/2001/XMLSchema#string" /> >>> </SubjectMatch> >>> </Subject> >>> </Subjects> >>> <Resources> >>> <AnyResource /> >>> </Resources> >>> <Actions> >>> <AnyAction /> >>> </Actions> >>> </Target> >>> </Rule> >>> <Rule RuleId="FinalRule" Effect="Deny"> >>> </Rule> >>> </Policy> >>> >>> As far as i understood this SHOULD constitute the same behaviour, but my >>> policy doesn't shut anyone out. And i have no idea why not. >>> >>> greetings and thanks for any help, >>> Jessi >>> >> ------------------------------------------------------------------------------ >> All of the data generated in your IT infrastructure is seriously valuable. >> Why? It contains a definitive record of application performance, security >> threats, fraudulent activity, and more. Splunk takes this data and makes >> sense of it. IT sense. And common sense. >> http://p.sf.net/sfu/splunk-d2d-c2 >> _______________________________________________ >> Fedora-commons-users mailing list >> Fedora-commons-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/fedora-commons-users > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2d-c2 > _______________________________________________ > Fedora-commons-users mailing list > Fedora-commons-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/fedora-commons-users ------------------------------------------------------------------------------ BlackBerry® DevCon Americas, Oct. 18-20, San Francisco, CA The must-attend event for mobile developers. Connect with experts. Get tools for creating Super Apps. See the latest technologies. Sessions, hands-on labs, demos & much more. Register early & save! http://p.sf.net/sfu/rim-blackberry-1 _______________________________________________ Fedora-commons-users mailing list Fedora-commons-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/fedora-commons-users