Hello Greg,

Ondrej Tomcik :: KISTLER :: measure, analyze, inovate

From: Gregg Reynolds [mailto:d...@mobileink.com]
Sent: Thursday, August 9, 2018 5:45 PM
To: Tomcik Ondrej
Cc: iotivity-dev@lists.iotivity.org; Scott King <scott.k...@fkabrands.com> 
(scott.k...@fkabrands.com); Max Kholmyansky (m...@sureuniversal.com); Kralik 
Jozef; Rafaj Peter
Subject: Re: OCF Native Cloud 2.0



On Thu, Aug 9, 2018 at 6:48 AM, Ondrej Tomcik 
<ondrej.tom...@kistler.com<mailto:ondrej.tom...@kistler.com>> wrote:
Dear IoTivity devs,

Please be informed that the new Cloud 2.0 design concept is alive: 
https://wiki.iotivity.org/coapnativecloud
Your comments are warmly welcome.
Implementation is in progress.


Obviously you put a lot of  work into this, thanks.

How does it handle third-party users?  For example, Mom, Dad, kids, relatives, 
guests, all have different permissions, dynamically configurable.
Current IoTivity implementation force you to use very specific user/device 
management model. What is bad.
In this concept, AuthorizationService implementation is completely up to the 
user – user is the company who want to use the OCF Native Cloud. Of course we 
will provide sample AuthorizationService which communicates with the GitHub, 
but this one will be not used for production – I believe ☺. If you’re 
interested in multiple owners of the device, share the device with friends, and 
so on, you have to model this structure of users and management on yur own. OCF 
Native Cloud just defines contract, how it is communicating with the 
AuthorizationService. Meaning, the OCF Native Cloud will ask 
AuthorizationService, if the pending request  (resource uri + device + token) 
is authorized or not. Token identifies the user who issued the request and 
together with resource uri + device id, AuthorizationService can clearly answer 
if the request is authorized or not.

AuthorizationService should also emit events (changes which SID (user 
identifier – subject id) has access to which DID (DeviceId)), which are cached 
by the OCF Native Cloud so each user request is not triggering request to the 
AuthorizationService.

Make sense? You can see it here:
https://wiki.iotivity.org/_media/auth_1.png?cache=&w=900&h=699&tok=413462
Or read whole Authorization Bounded Context - 
https://wiki.iotivity.org/coapnativecloud#authorization_bounded_context

And, important is this note:
Each request session must be backed by an access token, so the OCF Native Cloud 
can authorize that request. In case of the OCF Servers / Clients, a TCP session 
must be backed by the access token and validated through the sign-up process. 
Each command issued by the OCF CoAP Gateway is then backed by the validated 
token.

Gregg


-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#9839): 
https://lists.iotivity.org/g/iotivity-dev/message/9839
Mute This Topic: https://lists.iotivity.org/mt/24238274/21656
Group Owner: iotivity-dev+ow...@lists.iotivity.org
Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub  
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to