-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Admin authorisation for VO managers using VO roles #20
Comments
Excellent point. Given my recent encouners with VO admins, this is probably a lot less import to have feature than initally anticipated. |
All right, adding authorisation based on iss+sub for security people should be easy enough to do, now that this feature is supported for normal users. I assume the security contact can only suspend users with the same issuer? I suppose I'll put the second point on the back burner for now, it seems to be a high implementation effort for low gain. |
|
First case done in 022ba7b (v0.1.0): admin authorisation by sub+iss is possible, with configurable option to suspend users from any/own OP. Second case remains:
|
It is still unclear at this point what is the use case for the admin API (which can suspend and resume users by sub+iss). Depending on this, implementing the admin authorisation might be easier or more difficult.
The latest understanding we reached in our discussions was that this API will be used by (site-)external admins, who can be:
In the first case, how is this specified?
In the second case, if it is done using VO roles, it has to be checked that the user given by iss+sub is member of the same VO (not straight-forward, but doable by checking the local user mapped to the sub+iss and its local groups; we need to be able to retrieve from feudal the local group mapped to a given VO).
The text was updated successfully, but these errors were encountered: