← Back to team overview

openstack team mailing list archive

Re: Federated Identity Management (bursting and zones)


From: Eric Day [eday@xxxxxxxxxxxx]

> Well, they should start off with what the request specifies. For
> the 1.1 API, this takes the for of POST /v1.1/<owner>/servers/ so
> <owner> would be the owner. This could be anything depending on what
> the authenticated user has access to do and what the authz system
> defines for types, but Nova doesn't care as it's just a string.

Yes, this is a slight variation on our previous discussions, but I like it. 
What we're saying is that Instance (resource) names will be prefixed with container names and permissions will be applied to containers. 

It's good because it solves the problem of "on behalf of".

However, what I need to wrap my head around is how this would work in a federated fashion.

MyCo has a container structure and SP has a container structure. We need to manage permissions on:


and place the permissions at the top of the tree. Or,


and place the permissions at the /instances/finance level ... but how would these transfer across the public/private zone boundaries? (since MyCo.authz controls the permissions and SP.authz just enforces it)

>From an end-user perspective, does Alice or Bob need to know to manage permissions for MyCo and for the situations when the instances live with SP?

I need to stew on that some more.

> > This implies, of course, that there would be a means to chgrp() a resource in Nova across Zones. Not a big deal and pretty handy actually.

> Well, we may not always want to change the owner for this, we may
> want to simply add to the list of entities (user/groups/whatever)
> that can access it. Owner alone is not enough.

In this scenario chgrp() would equate to a move() operation ... to move from one "container" to another. 

>  but I don't care enough to spend time on what we call it. :)

> One thing to also think about is where we actually describe
> permissions. I mentioned this briefly in a previous thread, but I
> think this needs more exploration.
> Lets approach authz as looking at what Swift does today and expanding
> on it. A authenticated user in swift gets a list of 'groups' that
> user belongs to. This is just like what we've been talking about,
> except swift only has group name, not (group,action) tuples. A name
> in the group list can be anything, from another account, a tag,
> whatever. It's just a string. For now lets use 'group' and mean
> account/entity/whatever from above.
> There are then permissions on containers that specify actions for
> groups (think of group/action tuples on a resource). So if container
> X has write permission for group A, a user with group A in their
> list can insert objects there. The shortcoming with this model
> is that you need a resource to exist to assign permissions to it
> (for example, a container needs to be created by the account owner
> first). I asked Chuck and it sounds like you can't specify "group A
> can create containers for group/account B".

Not sure if I like the idea of read/write permissions vs. Rights (strings), but that's a side discussion. 

With Rights we could grant permission for a user to create a new container and assign Account B access to it.

can_create_container, can_change_owner

Or perhaps I'm missing the subtly here.

> In Nova, and probably other services, we want the ability to specify
> actions for groups when a resource doesn't exist. For example, I
> want to give group A the ability to create instances for group B,
> but there is no container resource yet. The obvious way to solve this
> is to do what we've been discussing and have the authz system return
> not just group name, but (group,action) tuples.

Can't the user just create the container first and then create the instance in the container?

> The question now is do we restrict the types of actions that can be
> specified in the authz system vs per-resource for a service? If you
> can specify can_reboot in both the authz system and per-resource,
> how are ambiguities resolved?
> For example, the authz system may return (group A, [can_create,
> can_reboot]), but an instance record may contain the permission
> tuple (group A, can_associate_ip). What can group A really do to
> that instance? Is it the union, intersection, or the most specific
> set of actions? If we design our authz in this way, we just need to
> be aware and choose.

I'm not clear how we ended up with permissions in two places? I thought the AuthZ would manage the tree of containers and permissions, not the services. The service would just do the permission check. 

Are you talking about per-resource overrides on the authz permissions?


> -Eric

Confidentiality Notice: This e-mail message (including any attached or
embedded documents) is intended for the exclusive and confidential use of the
individual or entity to which this message is addressed, and unless otherwise
expressly indicated, is confidential and privileged information of Rackspace.
Any dissemination, distribution or copying of the enclosed material is prohibited.
If you receive this transmission in error, please notify us immediately by e-mail
at abuse@xxxxxxxxxxxxx, and delete the original message.
Your cooperation is appreciated.

Follow ups