This page contains topics supporting ongoing discussion at dev@syncope.apache.org.
Tracked as SYNCOPE-119.
Also see [DISCUSS] Dynamic Realms.
This topic dates very early in Syncope's history (the mail thread referenced in the issue mentioned above was started in 2011, even before entering the incubator).
Fundamentally, it is intended as a proper replacement for the current authorization mechanism, which is in place since almost the beginning, based on the concept of role entitlement.
The idea is to introduce the concept of realm - widely employed elsewhere as a mean to define security constraints in order to restrict access to shared resources.
Entity changes
- Create the new Realm entity, with the following characteristics:
- has a name and a parent realm (except for the pre-defined root realm, which is named '/');
- will be either leaf or root of a sub-tree of realms;
- is uniquely identified by the path from root realm, e.g. /a/b/c identifies the sub-realm 'c' in the sub-tree rooted at 'b', having in turn 'a' as parent realm, directly under root realm;
- optionally refers to account or password policies.
- Rename the Role entity to Group and
- remove inheritance;
- remove references to account or password policies;
- remove references to entitlements;
- add reference to a realm: each group of a realm will also be group of sub-realms (as group is a specialization of any objects);
- Rename all ROLE_* entitlements to GROUP_*
- Create the new Role entity, with the following characteristics:
- has multiple references to entitlements;
- has multiple reference to realms: selected entitlements will be associated to the given realms (and sub-realms).
- Update the User entity by
- adding reference to a realm: each user of a realm will also be user of sub-realms (as user is a specialization of any objects);
- There won't be global account or password policies any more, but simply account / password policies for the root realm; account and password policies can be optionally defined for a given sub-realm: in this case the resulting policy to be applied will be the composition of all defined policies for ancestor realms up to root realm.
REST API changes
before | after | description |
---|---|---|
GET /realms GET /realms/a/b | list realms starting at given root: all realms in the former case, realms rooted at /a/b in the latter case | |
POST /realms/a/b | create realm under /a/b | |
PUT /realms/a/b/c/d | update realm /a/b/c/d | |
DELETE /realms/a/b | delete realm /a/b (and all sub-realms) | |
GET /users | GET /users GET /users;realm=/a/b | list users under the given realm (e.g. assigned to given realm and related sub-realms): all users in the former case, users in realm /a/b (all all sub-realms) in the latter case |
POST /users | POST /users POST /users?realm=/a/b | create user under the given realm: root realm in the former case, /a/b in the latter case |
PUT /users/{userId}?realm=/a/b | move user with id {userId} under realm /a/b | |
GET /users/search | GET /users/search GET /users/search;realm=/a/b | search users under the given realm: root realm in the former case, /a/b in the latter case |
GET /roles | GET /groups GET /groups;realm=/a/b | see users |
POST /roles | POST /groups | see users |
PUT /groups/{groupId}?realm=/a/b | move group with id {groupId} under realm /a/b | |
GET /roles/search | GET /groups/search GET /groups/search;realm=/a/b | see users |
GET /roles/{roleId}/parent | ||
GET /roles/{roleId}/children |
New security model
This is a direct replacement of current security model.
The idea is that any user U assigned to a role R, which provides entitlements E1...En for realms Re1...Rek can exercise Ei on entities (users or groups, depending on the type of Ei) under any Rej or related sub-realms.
About group membership and any relationships (see the related discuss page for details):
- User U can be member of group G either if U and G are in the same realm, or G is in one of super-realms of the realm of U
- Any A1 can be in relationship with any A2 either if A1 and A2 are in the same realm, or A2 is in one of super-realms of the realm of A1
The rationale behind such conditions is to allow the definition of common groups and any objects (to enter in relationship with) at the topmost position in the realm tree, so that they can be shared by various realm sub-trees.
Example
Let's rephrase the sample used for current security model:
Let's suppose that we want to implement the following scenario:
Administrator A can create users under realm R5 but not under realm R7, administrator B can update users under realm R6 and R8, administrator C can update groups under realm R8.
As default, Syncope will have defined the following entitlements, among others:
- USER_CREATE, USER_UPDATE, GROUP_UPDATE
Here it follows how entitlements should be assigned (via roles) to administrators in order to implement the scenario above:
- A: USER_CREATE on R5
- B: USER_UPDATE on R6 and R8
- C: GROUP_UPDATE on R8
2 Comments
Colm O hEigeartaigh
I'd suggest to update "5 Update the User entity by" by adding that a user also has multiple references to both groups and roles, it's not really clear from the existing text. Or alternatively, we could have a separate section that shows how everything relates without reference to the old model?
Francesco Chicchiriccò
Such information is surely needed, I believe it should be found in the reference guide (as per SYNCOPE-700) as part of the Syncope data model, rather than in this page, which is instead meant for "internal" (e.g. dev) reference.