[Freeipa-devel] [PATCH] 0513 Add managed read permissions to RBAC objects

Petr Viktorin pviktori at redhat.com
Thu Apr 10 15:03:38 UTC 2014

On 04/10/2014 03:20 PM, Martin Kosek wrote:
> On 04/10/2014 03:10 PM, Petr Viktorin wrote:
>> On 04/10/2014 03:07 PM, Martin Kosek wrote:
>>> On 04/10/2014 03:02 PM, Petr Viktorin wrote:
>>>> On 04/10/2014 02:58 PM, Martin Kosek wrote:
>>>>> On 04/10/2014 01:46 PM, Petr Viktorin wrote:
>>>>>> On 04/09/2014 05:17 PM, Martin Kosek wrote:
>>>>>>> On 04/09/2014 04:54 PM, Petr Viktorin wrote:
>>>>>>>> The meta-permissions.
>>>>>>> :-)
>>>>>>>> Read access is given to all authenticated users. Reading membership info
>>>>>>>> (i.e.
>>>>>>>> privileges) is split into a separate permission.
>>>>>>>> Another permission is added that allows read access to all ACIs.
>>>>>>>> If we don't want to open that up for everyone, I could limit this to only
>>>>>>>> ACIs
>>>>>>>> containing "permission:". (Since old-style permissions store their
>>>>>>>> information
>>>>>>>> in ACIs, their ACIs need to be readable.)
>>>>>>> If I read the notes from our DevConf discussion correctly, there are some
>>>>>>> inconsistencies:
>>>>>>> 1) We decided to not do special membership permission for
>>>>>>> permission/privilege/role permissions.
>>>>>>> 2) We decided to give read access to permissions, privileges and roles
>>>>>>> only to
>>>>>>> member of a certain privilege. Is there any reason to not do that? IMO,
>>>>>>> regular
>>>>>>> users do not need to be able to read the permission/privilege/role
>>>>>>> configuration of a FreeIPA installation to use it for IdM.
>>>>>>> Martin
>>>>>> Updated. I plan to add all the RBAC-related read permissions to a single
>>>>>> privilege, "RBAC Readers". Or do we want more granularity by default?
>>>>>> Requires my patch 0514.
>>>>> I was looking at the granularity we currently have with privilege and it is
>>>>> mostly per FreeIPA function (Sudo Administrator or DNS Administrator), not per
>>>>> IPA object (Sudo Command Administrator, Sudo Rule Administrator).
>>>>> I would thus follow the same principle with RBAC and create RBAC Administrator
>>>>> privilege which will cover read permissions for... permissions... privileges
>>>>> and roles. In time, we will also add new write privileges there as they are
>>>>> currently missing.
>>>>> To sum it up, the patch works, I would just change the name of the privilege
>>>>> and not focus it just on reading.
>>>> So to confirm, we want one privilege to cover both reading and writing?
>>> IMO, yes.
>>>> Should I add new read permissions to existing "Administrator" privileges only,
>>>> instead of creating new "Reader" permissions?
>>> I don't think so. The read permission we have been adding so far were targetted
>>> on anonymous/all binds, thus according to our design, they cannot be added to
>>> privilege anyway.
>>> But if someone wants to restrict an object, he is free to change the permission
>>> bind type to "group based" and assign it to a privilege.
>>> In our case, I would assign read permission to privilege only if we decided to
>>> make them group based, like RBAC or krbtpolicy ones.
>> Right, that makes sense. I'm asking about not having separate read privileges
>> when the permissions are group based. Based on Simo's other mail we should have
>> separate "Read" privileges.
>> Also IMO the read permissions should then be added both to the "Reader" and
>> "Administrator" privileges, since it doesn't make sense to be able to write but
>> not read.
> Ah, I understand the question now. This assumes that people may often want to
> allow a certain group of people to read RBAC or to read ticket policy.
> I would assume that a more frequent usage would be that administrator would
> allow all authenticated users read an object (which makes Read group
> redundant). But I am not insisting, I am open to both approaches.

I think it's reasonable to give read (but not write) access to 
lower-level admins only.

Here is an updated patch. I've added read for privileges and roles too, 
so the 'RBAC Readers' privilege should be complete.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: freeipa-pviktori-0513.3-Add-managed-read-permissions-to-RBAC-objects.patch
Type: text/x-patch
Size: 6303 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/freeipa-devel/attachments/20140410/e6f886d5/attachment.bin>

More information about the Freeipa-devel mailing list