Hi Michael,

Can I describe another likely situation?  

What if USER Timothy has the role of 'EDITOR' with read and update 
permissions on a specific resource, BUT....because of some condition, eg. 
if his sales is lesser than 100/month (let's call this attribute 
sales_per_month), he can only read and NOT update that resource.  How would 
this acl be?

@property
def __acl__(self):
  return [
      (Allow, 'editor', ('read', 'update'),
      (Deny, 'sales_lesser_than_100', 'update')
  ]

Should the deny be first in the list or should it be at the end?

On Wednesday, 14 March 2012 00:06:05 UTC-5, Michael Merickel wrote:
>
> On Tue, Mar 13, 2012 at 11:52 PM, Mark <[email protected]> wrote:
>
>> 1.  Does the above scenario mean that EVERY time a brand is created in
>> the system, I would have to generate for instance, "b1_create",
>> "b1_read" .... "b1_delete", "b2_create", "b2_read", "b2_update" ...
>> "b4_delete" permissions?
>>
>
> The way I would approach the problem is to have a "create", "read" and 
> "delete" permissions. When accessing a context of type B, it would then 
> supply an __acl__ which is dynamically generated based on its origins. For 
> example:
>
> @property
> def __acl__(self):
>     return [
>         (Allow, 'editor', ('read', 'update')),
>         (Allow, 'origin:' + self.origin, 'delete'),
>     ]
>
> With this, the object of type B has told us "who" is allowed to delete it. 
> Now when Timothy accesses the system, it would be the responsibility of the 
> authentication policy via the groupfinder to return a list of principals 
> for Timothy. For example, Timothy is from france, so you would add the 
> 'origin:france' principal, and he is an editor so you would add the 
> 'editor' principal. Now when the auth system compares B's acl to timothy's 
> principals, he will only have the delete permission if one of his 
> principals matches up with one of the ACE's providing delete.
>  
>
>> Another example would be something like:
>>
>> An agent of a company can make orders.  However, he should only be
>> able to select the products (this means read permission right?) from
>> his country.  If he is an agent of France, he can only make orders of
>> products that are only for France, not those in Germany or Holland.
>> How would the ACL for this work....?
>>
>
> Again, look at it from the perspective of the context (the object of 
> interest). That object (the product) should provide an ACL that tells the 
> auth system what principals are allowed to use it. For example the product 
> returns (Allow, 'agent_of_'+self.origin, 'read') where self is a product. 
> The auth system then compares these acls with the principals returned by 
> the authentication policy.
>

-- 
You received this message because you are subscribed to the Google Groups 
"pylons-discuss" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/pylons-discuss/-/mbA2i1_cOdMJ.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/pylons-discuss?hl=en.

Reply via email to