Hello Greg, Ondrej Tomcik :: KISTLER :: measure, analyze, inovate
From: Gregg Reynolds [mailto:d...@mobileink.com] Sent: Thursday, August 9, 2018 5:45 PM To: Tomcik Ondrej Cc: iotivity-dev@lists.iotivity.org; Scott King <scott.k...@fkabrands.com> (scott.k...@fkabrands.com); Max Kholmyansky (m...@sureuniversal.com); Kralik Jozef; Rafaj Peter Subject: Re: OCF Native Cloud 2.0 On Thu, Aug 9, 2018 at 6:48 AM, Ondrej Tomcik <ondrej.tom...@kistler.com<mailto:ondrej.tom...@kistler.com>> wrote: Dear IoTivity devs, Please be informed that the new Cloud 2.0 design concept is alive: https://wiki.iotivity.org/coapnativecloud Your comments are warmly welcome. Implementation is in progress. Obviously you put a lot of work into this, thanks. How does it handle third-party users? For example, Mom, Dad, kids, relatives, guests, all have different permissions, dynamically configurable. Current IoTivity implementation force you to use very specific user/device management model. What is bad. In this concept, AuthorizationService implementation is completely up to the user – user is the company who want to use the OCF Native Cloud. Of course we will provide sample AuthorizationService which communicates with the GitHub, but this one will be not used for production – I believe ☺. If you’re interested in multiple owners of the device, share the device with friends, and so on, you have to model this structure of users and management on yur own. OCF Native Cloud just defines contract, how it is communicating with the AuthorizationService. Meaning, the OCF Native Cloud will ask AuthorizationService, if the pending request (resource uri + device + token) is authorized or not. Token identifies the user who issued the request and together with resource uri + device id, AuthorizationService can clearly answer if the request is authorized or not. AuthorizationService should also emit events (changes which SID (user identifier – subject id) has access to which DID (DeviceId)), which are cached by the OCF Native Cloud so each user request is not triggering request to the AuthorizationService. Make sense? You can see it here: https://wiki.iotivity.org/_media/auth_1.png?cache=&w=900&h=699&tok=413462 Or read whole Authorization Bounded Context - https://wiki.iotivity.org/coapnativecloud#authorization_bounded_context And, important is this note: Each request session must be backed by an access token, so the OCF Native Cloud can authorize that request. In case of the OCF Servers / Clients, a TCP session must be backed by the access token and validated through the sign-up process. Each command issued by the OCF CoAP Gateway is then backed by the validated token. Gregg -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#9839): https://lists.iotivity.org/g/iotivity-dev/message/9839 Mute This Topic: https://lists.iotivity.org/mt/24238274/21656 Group Owner: iotivity-dev+ow...@lists.iotivity.org Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-