Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PAM WebSSO Entitlements Details #1419

Closed
HarryKodden opened this issue May 15, 2024 · 2 comments · Fixed by #1421
Closed

PAM WebSSO Entitlements Details #1419

HarryKodden opened this issue May 15, 2024 · 2 comments · Fixed by #1421
Milestone

Comments

@HarryKodden
Copy link
Member

At this moment the PAM WebSSO successful authentication gives following details:

 {
    "groups": [
        {
            "name": "SURF Research Cloud Live CO",
            "short_name": "live"
        }
    ],
    "info": "User [email protected] has authenticated successfully",
    "result": "SUCCESS",
    "username": "..."
}

We are planning to make use of 1 generic SRAM Service that will be connected to all ResearchCloud VM's that facilitate PAM WebSSO logins. That would allow users to access All these VM's if they are member of just 1 CO for which ResearchCloud has created a VM.
The alternative would be to create sidecar services for each individual CO.

I would suggest to keep it simple and have just 1 generic WebSSO Service that is connected to all CO's.
Then we need to apply additional checks that the authenticated user is indeed member of the CO for which the VM is created.

Therefor we can make use of the group membership delivered in the JSON response.
In order to make a non ambiguous ACL it is proposed to add the SRAM persistent ID to the group membership details, like this:

 {
    "groups": [
        {
            "name": "SURF Research Cloud Live CO",
            "short_name": "live",
            "id": "bccd3caa-b421-4f7a-aeb8-cb12704beb71",
        }
    ],
    "info": "User [email protected] has authenticated successfully",
    "result": "SUCCESS",
    "username": "..."
}

The ACL in the VM then could list the (list of) ID's that a authenticated user must be member of, to allow access

oharsta added a commit that referenced this issue May 16, 2024
…eblogin-Verify-Response

#1419 add entitlements to pam weblogin verify response
@oharsta
Copy link
Collaborator

oharsta commented May 17, 2024

Wrongfully closed issue

@oharsta oharsta closed this as completed May 17, 2024
@sram-project-automation sram-project-automation bot moved this from New to To be tested in SRAM development May 17, 2024
@oharsta oharsta reopened this May 17, 2024
@github-project-automation github-project-automation bot moved this from To be tested to New in SRAM development May 17, 2024
@FlorisFokkinga FlorisFokkinga moved this from New to In progress in SRAM development May 17, 2024
@baszoetekouw baszoetekouw linked a pull request May 17, 2024 that will close this issue
@FlorisFokkinga FlorisFokkinga moved this from In progress to To be tested in SRAM development May 17, 2024
@baszoetekouw baszoetekouw added this to the v34 milestone May 31, 2024
@mrvanes
Copy link
Contributor

mrvanes commented May 31, 2024

OK

@mrvanes mrvanes moved this from To be tested to To be deployed in SRAM development May 31, 2024
@sram-project-automation sram-project-automation bot moved this from To be deployed to To be tested in SRAM development Jun 10, 2024
@baszoetekouw baszoetekouw moved this from To be tested to To be deployed in SRAM development Jun 10, 2024
@sram-deploy-tools-automation sram-deploy-tools-automation bot moved this from To be deployed to Done in SRAM development Aug 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Archived in project
Development

Successfully merging a pull request may close this issue.

4 participants