Made a few notes on thoughts at the bottom. I won't replicate the notes here because it kind of requires reading through the link you supplied first. In short, I think we have some options for keeping AuthZ isolated to a given deployment and even a given service. I like this approach, because I want to minimize the number of contact points between different deployments.
Vish On Apr 1, 2011, at 7:40 AM, Sandy Walsh wrote: > I was stewing on the suggestion of subject/verb/object tuples. There's a > gotcha in the federated AuthZ situation: mapping Public and Private Objects > in the tuples. Essentially, who owns the rights over the object if the object > is externally managed (by, let's say, a service provider). > > My thoughts around how Federated AuthZ might work in Nova are updated here: > http://wiki.openstack.org/ZonesOauth#Thoughts_on_Federated_AuthZ > > (and made some slight tweaks to map it to conventional RBAC schemes) > > Please burn/spindle/mutilate ... > -S > > ________________________________________ > From: Vishvananda Ishaya [[email protected]] > Sent: Wednesday, March 30, 2011 7:29 PM > To: Sandy Walsh > Cc: Jay Pipes; [email protected] > Subject: Re: [Openstack] Federated Identity Management (bursting and zones) > > I think authz is simplest if we just give it the responsibility of mapping > subjects, verbs, and objects. > > subjects are returned by authn. They can be users/projects/roles/groups/etc, > but are basically opaque > verbs are defined by the application: > launch_instance, get_volume, get_container, etc. > objects are the entities that actions are performed on. > > Then the authz system can just define how these three are mapped to create a > pass/fail. > > There can be some magic in the rules to make this much easier: > > 1) the concept of an object_owner. This allows rules to match the stuff > returned by authn to an "owner" field on the object > > 2) dividing groups of actions into certain "roles" or "groups" returned by > authn. The obvious one here is "admin", but other general roles could be > defined as well. I'm not sure how we validate the roles returned by an > external authn server. We don't really want Alice's admins to have full > admin rights to our deploy. Perhaps some namespacing here is necessary. > alice.admin vs mydeploy.admin > > Vish > > On Mar 30, 2011, at 3:10 PM, Sandy Walsh wrote: > >> From: Jay Pipes [[email protected]] >> >>> Come to think of it, there's no reason that role A would need to have >>> similar privileges in >> zones X and Y. More likely than not, they would have different >> privileges, and therefore a federated authz service wouldn't really >> make sense. >> >> I see your point, I was thinking at the Rights level, not Roles/Groups, and >> envisioning Rights like: >> >> can_boot_os=windows;linux >> can_boot_flavor=tiny;small;medium >> can_migrate_outside_zone=True >> maximum_ram_size=512m >> >> Certainly, we could have pre-established Rights just as we would have common >> Roles/groups. >> >> -S >> >> >> Confidentiality Notice: This e-mail message (including any attached or >> embedded documents) is intended for the exclusive and confidential use of the >> individual or entity to which this message is addressed, and unless otherwise >> expressly indicated, is confidential and privileged information of Rackspace. >> Any dissemination, distribution or copying of the enclosed material is >> prohibited. >> If you receive this transmission in error, please notify us immediately by >> e-mail >> at [email protected], and delete the original message. >> Your cooperation is appreciated. >> > > > > Confidentiality Notice: This e-mail message (including any attached or > embedded documents) is intended for the exclusive and confidential use of the > individual or entity to which this message is addressed, and unless otherwise > expressly indicated, is confidential and privileged information of Rackspace. > Any dissemination, distribution or copying of the enclosed material is > prohibited. > If you receive this transmission in error, please notify us immediately by > e-mail > at [email protected], and delete the original message. > Your cooperation is appreciated. > > > _______________________________________________ > Mailing list: https://launchpad.net/~openstack > Post to : [email protected] > Unsubscribe : https://launchpad.net/~openstack > More help : https://help.launchpad.net/ListHelp _______________________________________________ Mailing list: https://launchpad.net/~openstack Post to : [email protected] Unsubscribe : https://launchpad.net/~openstack More help : https://help.launchpad.net/ListHelp

