Differences between revisions 2 and 16 (spanning 14 versions)
Revision 2 as of 2010-06-02 08:57:42
Size: 3938
Editor: abr
Comment:
Revision 16 as of 2010-06-10 13:07:27
Size: 4873
Editor: abr
Comment:
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
Line 17: Line 16:
 Time estimated::  Time estimated:: 20md in DigiRes, 7md in IT Web, 2x14 md in IT Service, ? in IT Maintenance
 
Line 20: Line 20:
Line 23: Line 22:
The doms auth system is responsible for ensuring that no user can access files without sufficient credentials. Furthermore, parts or entire doms record should be blockable with the auth system.
Line 24: Line 24:
The doms auth system is responsible for ensuring that no user can access files without sufficient credentials. Furthermore, no doms record should be viewable without the nessesary credentials. These are two different requirements. The Auth system is based around Fedora as the Authorization provider. Object policies are expressed in Fedora in XACML. There is meant to be a number of Authentication providers.
Line 26: Line 26:
 1. Auth check on bitstorage access
 1. Auth check on long post viewing
The auth system is layered. Authentication happens on the outer layer, against whatever Authentication providers we link with. The trusted services on the outer layer establishes the users roles/attributes. These are then communicated to Fedora, which evaluates them against the authorization policy.
Line 29: Line 28:
== Bitstorage auth design == With this design, we can have a single Authorization provider, and thus one place to define policies, but integrate with numerous signon systems.
Line 31: Line 30:
The design is as follows: The following components need to be established.
Line 33: Line 32:
 1. Each file in bitstorage is assigned a permanent URL
 1. An Apache server is set up to handle these URLs
 1. This apache server has the nessesary rewrite filters set up to forward the request to a php application.
 1. Php application ('''Written by IT service''')
  1. Extract Wayf credentials from the user. There might be no credentials, which is not yet an error.
  1. Extract the user IP (or domain), and set this as a user property
  1. Call the DomsAuth service with the permanent URL and the credentials if any (and the IP property), ('''Written by IT Digitale Ressourcer''')
   1. Doms Auth lookup the corresponding file object in fedora, and attempts to read this with the supplied credentials. If succesful, true is returned. Else false.
  1. If the DomsAuth service gave false and the user had no WAYF credentials, redirect the user to a wayf login page.
  1. If the DomsAuth service gave false, but the user had WAYF credentials, report error.
  1. If the DomsAuth service gave true, stream the file through the php app to the user
   1. Stream app. This app streams the given file from whereever into the php script so the user can read it. ('''Written by IT Maintenance''')

It can be seen that the php app will become a bottleneck. There are several designs that could work around this. Having several identical apache servers, and using a round robin dns would split the load.
 1. Some service that converts user roles into credentials that Fedora can work with.
  This could be done with a temporary LDAP server, or similar, or some magical stuff directly with Fedora. KFC has expressed views on this, so the design will not be completed without him
 1. A system that transparently handles the credentials when requesting files from bitstorage
 1. A system that transparently handles the credentials when displaying Doms objects in Summa
Line 49: Line 38:
=== RolesForFedora ===



=== Bitstorage ===


=== Summa display ===


== Estimates ==

Components
 * Doms Auth service (DigiRes)
  * Creating service, and making API '''(2B)'''
  * Speaking with Fedora '''(2B)'''
  * Creating users from roles (included in estimate for temp user db)
 * Temp user db (DigiRes)
  * Create service and memory database '''(5B)'''
 * Fedora (DigiRes)
  * Auth filter that speaks with Temp user db '''(3C)'''
  * Filterchain for above filter, and LDAP to our AD '''(2C)'''
 * Auth.php (IT service) '''(2x14md)'''
  * SimplSaml server
  * Php flow
  * Coordination (C because more unclear in design) (DigiRes) '''(1C)'''
 * Apache (IT Maintenance)
  * Establish a apache http server with mod_auth_cas
  * Coordination (A because standard task) (DigiRes) '''(1A)'''
 * Ip2Roles (DigiRes)
  * Backend, propably Derby Embedded DB '''(2C)'''
  * Rest Service (Services are 2B, for project creation, interface creation, and using the build framework) '''(2B)'''
  * The following two tasks will be done by IT Web, by promise of HL
   * Discover correct tech for making frontend for administrator. D because we might not find a good tech. '''(2D)'''
   * Impl frontend. B because if we find a good tech, there are few risks. '''(5B)'''
 
 
Line 55: Line 81:

Task Doms Auth system

Title
Doms Auth system

State
Not started

Time used

Time estimated

20md in DigiRes, 7md in IT Web, 2x14 md in IT Service, ? in IT Maintenance

Description

The doms auth system is responsible for ensuring that no user can access files without sufficient credentials. Furthermore, parts or entire doms record should be blockable with the auth system.

The Auth system is based around Fedora as the Authorization provider. Object policies are expressed in Fedora in XACML. There is meant to be a number of Authentication providers.

The auth system is layered. Authentication happens on the outer layer, against whatever Authentication providers we link with. The trusted services on the outer layer establishes the users roles/attributes. These are then communicated to Fedora, which evaluates them against the authorization policy.

With this design, we can have a single Authorization provider, and thus one place to define policies, but integrate with numerous signon systems.

The following components need to be established.

  1. Some service that converts user roles into credentials that Fedora can work with.
    • This could be done with a temporary LDAP server, or similar, or some magical stuff directly with Fedora. KFC has expressed views on this, so the design will not be completed without him
  2. A system that transparently handles the credentials when requesting files from bitstorage
  3. A system that transparently handles the credentials when displaying Doms objects in Summa

RolesForFedora

Bitstorage

Summa display

Estimates

Components

  • Doms Auth service (DigiRes)

    • Creating service, and making API (2B)

    • Speaking with Fedora (2B)

    • Creating users from roles (included in estimate for temp user db)
  • Temp user db (DigiRes)

    • Create service and memory database (5B)

  • Fedora (DigiRes)

    • Auth filter that speaks with Temp user db (3C)

    • Filterchain for above filter, and LDAP to our AD (2C)

  • Auth.php (IT service) (2x14md)

    • SimplSaml server

    • Php flow
    • Coordination (C because more unclear in design) (DigiRes) (1C)

  • Apache (IT Maintenance)
    • Establish a apache http server with mod_auth_cas
    • Coordination (A because standard task) (DigiRes) (1A)

  • Ip2Roles (DigiRes)

    • Backend, propably Derby Embedded DB (2C)

    • Rest Service (Services are 2B, for project creation, interface creation, and using the build framework) (2B)

    • The following two tasks will be done by IT Web, by promise of HL
      • Discover correct tech for making frontend for administrator. D because we might not find a good tech. (2D)

      • Impl frontend. B because if we find a good tech, there are few risks. (5B)

Sub tasks

Title State Time used Time estimated

Documentation

Progress history

Iteration Time used Status Notes Tasks adressed

Tasks/22 (last edited 2010-06-10 13:07:27 by abr)