[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-11-26 Thread Rohit Yadav (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14226410#comment-14226410
 ] 

Rohit Yadav commented on CLOUDSTACK-5920:
-

Is this going to end up on 4.5/master anytime soon?

 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.5.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-05-27 Thread Daan Hoogland (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14009751#comment-14009751
 ] 

Daan Hoogland commented on CLOUDSTACK-5920:
---

As announced by Min, this will not make it in 4.4. Changing fix-version to 4.5 
for now (should be 5.0)

 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.5.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-06 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923140#comment-13923140
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit adb29b21402d4b446471c2d2741e09cd7b2106aa in cloudstack's branch 
refs/heads/rbac from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=adb29b2 ]

CLOUDSTACK-5920: IAM service server.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-06 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923139#comment-13923139
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit 793becf524520c62fd5df35b22128db13347f6c9 in cloudstack's branch 
refs/heads/rbac from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=793becf ]

CLOUDSTACK-5920: Add some interface methods and constants required by
IAM.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-06 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923143#comment-13923143
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit 63e3eea7905e22cab9466b28a2ab2a80b586aeed in cloudstack's branch 
refs/heads/rbac from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=63e3eea ]

CLOUDSTACK-5920: enable build of IAM services in pom.xml.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-06 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13923142#comment-13923142
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit c28450c1cdb51fba035f8f8f864dd0450ea1e099 in cloudstack's branch 
refs/heads/rbac from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=c28450c ]

CLOUDSTACK-5920: IAM service plugin.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-05 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921130#comment-13921130
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit c28450c1cdb51fba035f8f8f864dd0450ea1e099 in cloudstack's branch 
refs/heads/master from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=c28450c ]

CLOUDSTACK-5920: IAM service plugin.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-05 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921127#comment-13921127
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit d0ae4d9a9f7dc2ef39ee24f09c36f67ccb7502d7 in cloudstack's branch 
refs/heads/master from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=d0ae4d9 ]

CLOUDSTACK-5920:Add interface to ControlledEntity to return IAM
entity type.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-05 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921129#comment-13921129
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit adb29b21402d4b446471c2d2741e09cd7b2106aa in cloudstack's branch 
refs/heads/master from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=adb29b2 ]

CLOUDSTACK-5920: IAM service server.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-03-05 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13921131#comment-13921131
 ] 

ASF subversion and git services commented on CLOUDSTACK-5920:
-

Commit 63e3eea7905e22cab9466b28a2ab2a80b586aeed in cloudstack's branch 
refs/heads/master from [~minchen07]
[ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=63e3eea ]

CLOUDSTACK-5920: enable build of IAM services in pom.xml.


 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: New Feature
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-02-03 Thread Prachi Damle (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13890127#comment-13890127
 ] 

Prachi Damle commented on CLOUDSTACK-5920:
--

Hi Daan,

The rbac design includes access control over both - at api level and at 
resource level.
It is possible to limit what APIs an account can invoke, as well it is possible 
to define what resources the account can invoke those actions too.

example:
UseCase: I want to create a set of accounts that have permissions to all list 
Apis only
Solution:
- Create a group for these accounts
- Create a custom policy and add permissions to this policy for every API that 
is allowed.
- Attach this policy to the group

UseCase: I want to grant permissions to all VMs in my account for 
Start/Stop/List actions,  to another account.
- Create a custom policy and add permissions granting access per API one can 
invoke for the ResourceType VM under scope Account and scopeId = Vm owner 
accountId

Permissions will look like:
 acl_permission

id | action | resource_type |  scope_id | scope | access_type | permission 
1 | startVirtualMachine | VirtualMachine | account_id | ACCOUNT | UseEntry | 
Allow
1 | stopVirtualMachine | VirtualMachine | account_id | ACCOUNT | UseEntry | 
Allow 
1 | listVirtualMachines| VirtualMachine | account_id | ACCOUNT | UseEntry | 
Allow 

- Attach this policy to the account you want to grant access too.

Thus the permission grant involves API's as well as resources.

 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: Bug
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-02-01 Thread Rajani Karuturi (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=1326#comment-1326
 ] 

Rajani Karuturi commented on CLOUDSTACK-5920:
-

Hi Daan,
I think its going to be on api-call basis.
Please check the related mail discussion @ 
http://cloudstack.markmail.org/message/q2joujsnztytseje
The proposed design is at 
https://cwiki.apache.org/confluence/display/CLOUDSTACK/CloudStack+Identity+and+Access+Management+%28IAM%29+Plugin#CloudStackIdentityandAccessManagement(IAM)Plugin-SampleDBentriesforthepolicypermissionsfor'StartVM'operation:

 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: Bug
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)


[jira] [Commented] (CLOUDSTACK-5920) CloudStack IAM Plugin feature

2014-01-31 Thread Daan Hoogland (JIRA)

[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-5920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13887878#comment-13887878
 ] 

Daan Hoogland commented on CLOUDSTACK-5920:
---

Prachi, would you implement rbac on resources or on api-calls, or would 
api-calls just be a higher level of resource in the design you have in mind?

 CloudStack IAM Plugin feature
 -

 Key: CLOUDSTACK-5920
 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5920
 Project: CloudStack
  Issue Type: Bug
  Security Level: Public(Anyone can view this level - this is the 
 default.) 
  Components: API, Management Server
Affects Versions: 4.3.0
Reporter: Prachi Damle
Assignee: Prachi Damle
 Fix For: 4.4.0


 Currently CloudStack provides very limited IAM services and there are several 
 drawbacks within those services:
 -  Offers few roles out of the box (user and admin) with prebaked access 
 control for these roles. There is no way to create additional roles with 
 customized permissions.
 -  Some resources have access control baked into them. E.g., shared networks, 
 projects etc. 
 -  We have to create special dedicate APIs to grant permissions to resources.
 - Also it should be based on a plugin model to be possible to integrate with 
 other RBAC implementations say using AD/LDAP in future 
 Goal for this feature would be to address these limitations and offer true 
 IAM services in a phased manner.
 As a first phase, we need to separate out the current access control into a 
 separate component and create a standard access check mechanism to be used by 
 the API layer. Also the read/listing APIs need to be refactored accordingly 
 to consider the role based access granting.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)