Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guard access to security domains #117

Open
darranl opened this issue Oct 14, 2015 · 1 comment
Open

Guard access to security domains #117

darranl opened this issue Oct 14, 2015 · 1 comment
Assignees
Milestone

Comments

@darranl
Copy link
Contributor

darranl commented Oct 14, 2015

Also related to this is how we handle trust from security domain to security domain.

@darranl darranl self-assigned this Oct 14, 2015
@darranl darranl added this to the 1.0.0.Alpha3 milestone Oct 14, 2015
@darranl darranl modified the milestones: 1.0.0.Alpha3, 1.0.0.Alpha4 Oct 28, 2015
@darranl darranl modified the milestones: 1.0.0.Alpha4, 1.0.0.Alpha5 Nov 27, 2015
@darranl darranl modified the milestones: 1.0.0.Alpha7, 1.0.0.Alpha8 Apr 5, 2016
@darranl
Copy link
Contributor Author

darranl commented May 13, 2016

Conversation re this issue: -

Darran Lofthouse
17:30
@DavidMLloyd a while back I raised an issue in the subsystem to guard access to the security domains #117 - now I am starting to think if we did decide to support some protection then really that is something handle within MSC - i.e. permissions checks before injecting / accessing the value of the service. Which would mean even if we don't support anything like that now I can forget about it from the perspective of the subsystem.
Link
17:30
Guard access to security domains · Issue #117 · wildfly-security/elytron-subsystem
Also related to this is how we handle trust from security domain to security domain.
David M. Lloyd
17:41
I think security domains are fairly safe to access
all the operations which might be sensitive are protected by perm checks
David M. Lloyd
17:42
hmm maybe not, I see mapName is exposed
David M. Lloyd
17:43
well we could either firm up access checks for users of security domains, or we could create a protected Supplier
David M. Lloyd
17:47
I don't think MSC can handle it generically; it would add overhead, and also maybe be incorrect because of the relative nature of service names
Darran Lofthouse
17:54
Problem is we also end up with the realms possibly also needing some protection
switching to Supplier however makes it easier for us to add a permissions check
David M. Lloyd
17:55
yeah we could do that for various things pretty easily
Darran Lofthouse
17:55
I will keep that issue open for a bit then so we will think about it in terms of Elytron if we don't think something generic is suitable

@darranl darranl modified the milestones: 1.0.0.Alpha8, 1.0.0.Alpha9 Jun 15, 2016
@darranl darranl modified the milestones: 1.0.0.Alpha9, 1.0.0.Alpha11 Sep 16, 2016
@darranl darranl modified the milestones: 1.0.0.Beta5, 1.0.0.Beta6, 1.0.0.Beta7, 1.0.0.Beta8 Feb 8, 2017
@darranl darranl modified the milestones: 1.0.0.Beta9, 1.0.0.Beta10 Feb 16, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant