Hey Joe:

Currently a user scoped token doesn't include a service catalog - mostly 
because I think the service catalog generally requires tenant_id's to 
interpolate into the values to provide it. That doesn't mean we can't put 
in/include service catalog endpoints where that value doesn't need to be 
determined.

I'm also questioning the value of providing a token scoped to all tenants 
associated with a user - that seems to have the same value as just using a user 
token. 

In fact, even if we allow some arbitrary set of tenants to be scoped into a 
token along with a user, what on earth should be in the service catalog? 
Endpoints relevant to every possible tenant?

This just seems to be a potential explosion of data that is poorly scoped from 
a security perspective.

-joe

On Nov 13, 2012, at 1:42 PM, Joe Savak <joe.sa...@rackspace.com> wrote:
> Will user-scoped token include the full service catalog? 
> 
> Also, I thought the consensus was to allow the API contract to be flexible on 
> how many tenants we can scope the token to. The ref impl can enforce 1 
> tenant-scoped token. Are we diverging from this?
> 
> Thanks,
> joe
> 
> -----Original Message-----
> From: openstack-bounces+joe.savak=rackspace....@lists.launchpad.net 
> [mailto:openstack-bounces+joe.savak=rackspace....@lists.launchpad.net] On 
> Behalf Of heckj
> Sent: Tuesday, November 13, 2012 1:34 PM
> To: OpenStack Development Mailing List
> Cc: openstack@lists.launchpad.net (openstack@lists.launchpad.net)
> Subject: Re: [Openstack] [openstack-dev] Fwd: [keystone] Tokens representing 
> authorization to projects/tenants in the Keystone V3 API
> 
> 
> On Nov 13, 2012, at 11:01 AM, Jorge Williams <jorge.willi...@rackspace.com> 
> wrote:
>> On Nov 13, 2012, at 11:35 AM, heckj wrote:
>>> So maintaining a token scoped to just the user, and a mechanism to scope it 
>>> to a tenant sound like all goodness. We can absolutely keep the API such 
>>> that it can provide either. 
>>> 
>>> Right now, our auth_token middleware implicitly requires a tenant in that 
>>> scoping to work. If someone wanted to support a token scoped to just a user 
>>> for the services, they'd need a different middleware there. Keystone as a 
>>> service *doesn't* use the auth_token middleware, so with the V3 API we can 
>>> make it provide services appropriately based on a token scoped only to the 
>>> user.
>>> 
>>> All that in place, allow a token to be indeterminate scoped to multiple 
>>> tenants is fraught with security flaws, and if we continue to provide 
>>> unscoped tokens, that should obviate the need for token scoped to multiple 
>>> tenants. 
>> 
>> I'm not sure I'm following you there.  I don't see how unscoped tokens 
>> obviate the need to scope to multiple tenants, these may be driven by  
>> different concerns. 
>> 
>> Again, I think we need to have some flexibility in how we scope tokens. The 
>> API should be flexible enough to support different models -- I think that 
>> scoping a token to multiple tenants is useful in cases such as delegation -- 
>> where a single identity may be issued revokable access to a set of resources 
>> in multiple projects.
> 
> The consensus from the folks weighing in on this from a security perspective 
> seems to be that it's kosher to restrict tokens further (the least privilege 
> thing). Broadening the scope to multiple tenants or sets of tenants doesn't 
> appear to follow those best practices. If you wanted to accept a less-scoped 
> token than the scoped to single tenant, you can accept and use a user-scoped 
> token, at least by my read.
> 
> -joe
> 
> 
> 
> _______________________________________________
> Mailing list: https://launchpad.net/~openstack
> Post to     : openstack@lists.launchpad.net
> Unsubscribe : https://launchpad.net/~openstack
> More help   : https://help.launchpad.net/ListHelp


_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to