[ 
https://issues.apache.org/jira/browse/OAK-4101?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

angela resolved OAK-4101.
-------------------------
       Resolution: Fixed
    Fix Version/s: 1.5.3

Committed revision 1744292.

In addition to the findings reported by [~tripod], I found some issues in the 
test-cases, wrote additional tests for the principal query, renamed the new, 
derived SyncContext implementation and moved it to the impl package.
Then: adjusted the external-auth benchmark base and improved the documentation 
of the feature (and default user sync in general).

[~baedke], I would appreciate it you could take a closer look at the committed 
changes and the documentation. I would suggest to open new follow-up issues for 
your findings and only reopen this one if you find fundamental mistakes or 
inconsistencies.

> Consider separate external (group) principal management
> -------------------------------------------------------
>
>                 Key: OAK-4101
>                 URL: https://issues.apache.org/jira/browse/OAK-4101
>             Project: Jackrabbit Oak
>          Issue Type: New Feature
>          Components: auth-external
>            Reporter: angela
>            Assignee: angela
>             Fix For: 1.5.3
>
>         Attachments: OAK-4101.patch, OAK-4101_test.patch
>
>
> Given the fact that user management is delegated to an external IDP provider, 
> we might reconsider the current approach that attempts to synchronize user 
> and particularly group and their membership into the repository.
> What would left with the repository is a dedicated {{PrincipalProvider}} for 
> external groups (and maybe even users at a later stage), making sure that
> - the {{Subject}} is properly populated with {{Principal}} s upon login
> - access control can still be properly setup and managed in the repository 
> for the principals defined in the external IDP.
> the consequences would be:
> - external groups (and potentially) users would no longer made available to 
> the default user management implementation. alternatively: make them 
> available as read-only stub i.e. group-membership as defined by the IDP could 
> no longer be changed/manipulated in the reposiotry.
> - they are however exposed as principals to assert proper authentication + 
> authorization. Note: any UI that properly reflects the fact that access 
> control is being edited for principals (and not for users/groups) would not 
> be affected at all; others might need to be adjusted to additionally support 
> ac management based on the {{PrincipalManager}}
> will try to come up with a POC as soon as I find some time.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to