-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PAM WebSSO Entitlements Details #1419
Milestone
Comments
oharsta
added a commit
that referenced
this issue
May 16, 2024
…eblogin-Verify-Response #1419 add entitlements to pam weblogin verify response
Wrongfully closed issue |
OK |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
At this moment the PAM WebSSO successful authentication gives following details:
We are planning to make use of 1 generic SRAM Service that will be connected to all ResearchCloud VM's that facilitate PAM WebSSO logins. That would allow users to access All these VM's if they are member of just 1 CO for which ResearchCloud has created a VM.
The alternative would be to create sidecar services for each individual CO.
I would suggest to keep it simple and have just 1 generic WebSSO Service that is connected to all CO's.
Then we need to apply additional checks that the authenticated user is indeed member of the CO for which the VM is created.
Therefor we can make use of the group membership delivered in the JSON response.
In order to make a non ambiguous ACL it is proposed to add the SRAM persistent ID to the group membership details, like this:
The ACL in the VM then could list the (list of) ID's that a authenticated user must be member of, to allow access
The text was updated successfully, but these errors were encountered: