Hi Martin,

The new "OpenCA API" is implemented by the "OpenCA Execution Engine"
which in turn uses a "Workflow Engine" to model the object modification
workflow.

Perhaps we should not call it a workflow engine. A policy engine avoids conflicts with the statemachine in terms of the functionality and interpretations.


2. CA, batch and other private key and passphrase handling

Could work like this (idea/suggestion):

- The token itself is a random number (e. g. 128 Bit). It can thus
  safely be passed to the user e. g. in a cookie or in a hidden
  field.
- The token is created by the Authentication Module after a
  successful authentication (which may also be 'none').
- Token validity can be
  - unlimited (until destroyed)
  - hard timeout (relative or absolute validity after which the token
    is not usable any more)
  - soft timeout (relative timeout that is reset after each API call
    with this token, keeping the session alive)
  - soft timeout with hard limit (same as before with maximum total
    validity)
- Tokens can be explicitly invalidated via the Authentication API
  (logout)
- Every OpenCA API function accepts and requires the session
  token. The token is passed/propagated internally across each
  call (whereever possible).
- Token access is read-only for the API and every receiving function
- The token is a key for a session object that is stored in the
  database. The session object contains information about
  user, authentication method used, validity of the token/session
  etc. It does not contain authorization information.
- The Authorization framework is queried by each API function
  (and probably by subordinate functions) using the specified token.
  Thus every function can deduce if the current user (holder of
  the token) is allowed to perform the desired function.

Perhaps we can throw away our old session handling with this technology. If the session is stored directly in the memory of the server process or in a memory mapped file then we can store even passphrases in this area and the session handling is nearly transparent (except of the cookie or the session ID in the link). BTW it is perhaps a good idea to use IDs in links and no cookies but this requires some fundamental changes too - like always :) ... and we have already enough work for the next months ;)


Perhaps I find some time in the next days to create some nice graphics.
I think this is required for our design approaches to give other peoples
a chance to understand what we are doing.

Perhaps I will find some time for some design work, too. I will contact you to coordinate this, OK?

OK.

Michael
--
_______________________________________________________________

Michael Bell                    Humboldt-Universitaet zu Berlin

Tel.: +49 (0)30-2093 2482       ZE Computer- und Medienservice
Fax:  +49 (0)30-2093 2704       Unter den Linden 6
[EMAIL PROTECTED]   D-10099 Berlin
_______________________________________________________________


-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now. http://productguide.itmanagersjournal.com/
_______________________________________________
OpenCA-Devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/openca-devel

Reply via email to