On 10/06/08 15:24, Joerg Barfurth wrote:
> I agree that it is hard to understand. Profiles are a set of security 
> attributes that apply together. They include authorizations, privileges 
> and privileged commands with a capability to build profiles from other 
> profiles. Using them as a loose collection of authorizations (in a 
> disjoint sense, i.e. any of the auths will do) for this proposal, blurs 
> the concept for admins and users and makes the RBAC framework harder to 
> understand (IMHO).

That is the reasoning that led us to drop the feature. Thanks for the 
note about the man page, I'll update it.

> A somewhat related point: the 'wildcards in authorization names' part of 
> the proposal is also very much underspecified. Usually wildcards of the 
> some.auth.* variety (in user_attr or in profiles) match any 
> authorization with that prefix (e.g. some.auth.for.a.special.feature). 
> Bart explained in this discussion that for this case the match was meant 
> to be single component only, which is counterintuitive, if you know the 
> other concept.

The wildcards are meant to work as wildcards, matching the same set as 
are matched when assigning authorizations:

- when they're used in user_attr's auths= it assigns all of the 
authorizations underneath to a user,

- when they're used in pam_authorized auths= it accepts any of the 
authorizations underneath.

The wildcard matches the same authorizations, it is only the 
interpretation that differs ("assigned to user" vs. "sufficient for 
access").

Bart

Reply via email to