Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Indicates who took minutes - (star)
  • ReadyTalk:
    • U.S.A/Canada toll free: 866-740-1260, participant code: 2257295
    • International toll free:
      • http://www.readytalk.com/intl
      • Use the above link and input 2257295 and the country you are calling from to get your  country's toll-free dial-in number
      • Once on the call, enter participant code 2257295
  • IRC:

Agenda

  1. AuthN/Z Design and Use cases

Minutes

...

  1. PEP can be made effective
    • ensure correct response codes
    • early work on filtering search/triplestore results
    • mock PEP
  2. First cut, store policies within f4
  3. Goal
    • Three users, three rights r/w, r-o, no-access
  4. Two questions
    1. What permissions does this principal have?
    2. What can I do?
Panel
titleShort-term Goals
  1. Define a Policy Enforcement Point (PEP) interface (done)
  2. Make sure Fedora REST calls honor PEP decisions with proper response codes (via mocked or stubbed PEP implementation) (in progress)
  3. Create a simple ACL model for persistence on Fedora objects. (with read, write and acl-write/admin roles assigned to usernames)
  4. Create and test a simple, non-XACML PEP that is driven by this ACL.

Help welcomed with the following:

  • Creating an extension point for retrieving user details and marshaling these into security principals we can serialize as strings (for ACLs). (E.g. LDAP groups, named IP ranges (On Campus), age, whatever) 
  • Outline app developer needs with regards to no-op security checks 
  • Outline app developer security needs for UI development generally 
  • More thoughts on what we can do to support PEPs that delegate to external PDPs.

 

Persistence should be unified?

  • Holding policies close to the content is a matter of durability

Actions