Below:

On Jul 18, 2011, at 3:28 AM, Salvatore Orlando wrote:

> Hi,
>  
> I’m jumping in this thread to understand whether there’s a chance KeyStone 
> can implement some use cases around the concept of object ownership.
> I apologise if this email turns out to be a bunch of nonsense; unfortunately 
> I don’t have a strong AAA background J.
>  
> As pointed out several times in this thread, this is something which should 
> be enforced in the service: once a request comes in, the AA middleware 
> validates the token and retrieves user identity with Keystone, using it to 
> verify whether the user owns the objects on which the request operates.
> However, sometimes requests operate on objects defined in different services; 
> for instance in the Quantum service (L2 networking), the operation for 
> plugging an interface on a port operate on the following resources:
> -          The network and the port, defined in quantum
> -          The interface being plugged, defined in nova
> The AA middleware needs to verify that the user ‘owns’ all these resources, 
> in order to ensure, for instance, that a tenant does not plug another 
> tenant’s interface in his own network.
> As this process involves resources defined in two distinct services, I was 
> wondering whether Keystone could help in any way, by exposing APIs for 
> registering/unregistering/listing object ownership relationships.
> These relationships could be stored in the form <service-name>:<object-uuid> 
> and associated to the appropriate Keystone object, tenant or user. AA 
> middleware in services such as Quantum could query Keystone for the list of 
> objects owned by a given user/tenant in a service or for establishing whether 
> a user/tenant owns specific object(s).
>  
> Would it be reasonable to expect to have something like that in Keystone?

Object ownership is a bit of a nebulous concept.  Instead each service should 
define particular actions. For example:
<role> can_attach_port <port_id>
<role> can_plug_interface <interface>

The system can go through and do checks on each particular action in the 
context of a subject (role), predicate (action), and object (object).  In my 
mind, the most bang for the buck is to think of the subject as a role (or list 
of roles).

In this model, authn is responsible for mapping a token to user / tenant / 
roles and authz is responsible for mapping roles / actions / objects.

Now it is possible to define some shared cases where your authz mapping could 
use wildcard matching.  For example

*, can_attach_port, 75 -> any role can attach to port 75
admin, can_plug_interface, * -> an admin can plug into any interface.

You can create more control by allowing the authz system to group objects in 
the same way that roles can "group" tenants, for example:

big_tenant, can_attach_ports, (owned_by_big_tenant) -> allow anyone with the 
big_tenant role to attach to any port owned by big_tenant

"ownership" is an implicit grouping of objects by "owner".  The most general 
case would allow objects to be grouped in arbitrary ways, but I think the 
majority of use cases are solved by allowing very specific grouping according 
to owner_id

This is how we implemented it in the authn / authz branch of many moons ago, 
and it seemed to provide enough flexibility.

Vish



_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to