You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 31 Next »

Background

Currently CloudStack provides very limited IAM services and there are several drawbacks within those services:

  • Offers few roles out of the box (user and admin) with prebaked access control for these roles. There is no way to create additional roles with customized permissions.
  • Some resources have access control baked into them. E.g., shared networks, projects etc.
  • We have to create special dedicate API to grant permissions.

Goal for this feature would be to address these limitations and offer true IAM services in a phased manner

Architecture and Design description

IAM Taxonomy

iamTaxonomy

Group

Group contains a number of CloudStack accounts. Customers should be able to Create, Edit, List and Delete Groups. Editing includes adding or removing accounts to or from a group. For backwards compatibility, out of box, CloudStack will provide 3 default groups:

  • Root Admin Group
  • Domain Admin Group
  • End User Group

Account

Account is just our current CloudStack Account, all the permission controls are done at Account level. We can assign an Account to more than one Group.

User

CloudStack user just contains login credentials, and this is not the level that we are performing permission control.

Policy

Policy is a set of permission. Customer should be able to attach several policies to a Group to define the permission for that group. By default, we have the following 3 types of policy templates:

  1. Root Admin Policy: have permissions to all resources in the CloudStack.
  2. Domain Admin Policy: have permissions to all resources under the belonging domain.
  3. Resource Owner Policy: have permissions to all owned resources.

Other than that, customer should be able to define customized policies by grant or deny permission to customize permissions for the group. So far, for cross-account permission grant, we are currently supporting the following 3 types of granting/denying:

  • Grant by Domain and Resource Type: grant permissions to all resources of the given resource type under the given domain.
  • Grant by Account and Resource Type: grant permissions to all resources of the given resource type under the given account.
  • Grant by individual resource: grant permission to an individual resource.

Permission

A policy consists of set of Permissions. A Permission is a way of defining access control.
Using Permission, customer defines what actions are allowed or denied, on what resources, under which account or domain.

A single permission definition consists of:

  • Action (API Name)
  • Allow / Deny
  • Scope (Account | Domain | Resource)
  • Scope Id (Id of the above defined scope)
  • Resource Type

Response View (Column Filter)

Currently CloudStack supports two different views: Admin view for root admin user, User view for domain admin and end user. With IAM added, we still need to support this for newly added account groups. Analogy to row filter controlled by Permission, this is like column filter. For this release, we are not supporting dynamic column filter at API level, instead, out-of-box, we will provide two static response views: Admin view and User view. When user is creating a group, they can specify what kind of view that this group account should see.

IAM Schema

IAM API

New API's

  • createAclGroup
    1. String name - name of the ACL group. Required
    2. String description - short decsription
    3. String domainId - UUID of the domain of the account owning the acl group
  • deleteAclGroup
    1. String id - UUID of the ACL group. Required
  • listAclGroups
    1. String name - name of the ACL group.
    2. String id - UUID of the ACL group.
  • addAccountToAclGroup
    1. String id - UUID of the ACL group. Required
    2. List<String> accounts - comma separated list of account id that are going to be assigned to the acl group
  • removeAccountFromAclGroup
    1. String id - UUID of the ACL group. Required
    2. List<String> accounts - comma separated list of account id that are going to be removed from the acl group
  • createAclPolicy
    1. String name - name of the ACL Policy. Required
    2. String description - short decsription
    3. String domainId - UUID of the domain of the account owning the acl policy
  • deleteAclPolicy
    1. String id - UUID of the ACL Policy. Required
  • listAclPolicies
    1. String name - name of the ACL policy.
    2. String id - UUID of the ACL policy.
  • attachAclPolicyToAclGroup
    1. String id - UUID of the ACL group. Required
    2. List<String> policies - comma separated list of policy ids that are going to be assigned to the acl group
  • removeAclPolicyFromAclGroup
    1. String id - UUID of the ACL group. Required
    2. List<String> policies- comma separated list of policy ids that are going to be revoked from the acl group
  • createAclPermission
    1. String action - name of the API allowed/denied. Required
    2. String permission - "Allow"/ "Deny"
    3. String scope- ("Account" / "Domain" / "Resource")
    4. String scope id - UUID of the Scope
    5. String resourceType
  • addAclPermissionToAclPolicy
    1. String id - UUID of the ACL policy. Required
    2. List<String> permissionIds - comma separated list of permission ids that are going to be added to the acl policy
  • removeAclPermissionFromAclPolicy
    1. String id - UUID of the ACL policy. Required
    2. List<String> permission Ids - comma separated list of permission ids that are going to be removed from the acl policy

IAM Interface

CloudStack currently has a domain-tree based implementation of access checks, namely com.cloud.acl.DomainChecker. This implementation is based on the an adapter interface of Cloudstack - org.apache.cloudstack.acl.SecurityChecker that defines the basic ACL interface to check ownership and access control to objects within the account/ domain.

The IAM plugin will provide another implementation of the SecurityChecker intrerface. We will also have to add to this interface some more methods or change some signatures to facilitate policy and Action based access control.

/**
* SecurityChecker checks the ownership and access control to objects within
*/
public interface SecurityChecker extends Adapter {

...

/**
* Checks if the account can access the object.
*
* @param caller
* account to check against.
* @param entity
* object that the account is trying to access.
* @param accessType
*
* @param action
*
* @return true if access allowed. false if this adapter cannot provide permission.
* @throws PermissionDeniedException
* if this adapter is suppose to authenticate ownership and the check failed.
*/
boolean checkAccess(Account caller, ControlledEntity entity, AccessType accessType, String action) throws PermissionDeniedException;

....
}

Response View

  • No labels