Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add authentification component #5

Open
herzogrh opened this issue Jul 4, 2024 · 10 comments
Open

Add authentification component #5

herzogrh opened this issue Jul 4, 2024 · 10 comments
Assignees
Labels
enhancement New feature or request musthave "Must have" prioritization for the project

Comments

@herzogrh
Copy link
Member

herzogrh commented Jul 4, 2024

There should be an authentification component that handles

  1. authentification of the model platform with different model servers. Currently only BasicAuth is supported, but other model servers should be connectable via different authentification solutions (eg. Bearer Tokens, Digest Auth, ...)
  2. authentification of users connecting to the model platform

There should be a separate identity and access management system (Keycloak) that is connected with the platform.

@herzogrh herzogrh added the enhancement New feature or request label Jul 4, 2024
@herzogrh herzogrh changed the title API Component: Support of other authentification variants Add authentification component Aug 12, 2024
@herzogrh herzogrh added the musthave "Must have" prioritization for the project label Aug 19, 2024
@hwbllmnn
Copy link
Collaborator

The second part is solved with #27

@hwbllmnn
Copy link
Collaborator

Regarding the first part, do we have any example servers with different authentication methods to test with?

@herzogrh
Copy link
Member Author

Not yet unfortunately

@hwbllmnn
Copy link
Collaborator

@herzogrh Can this issue be closed? Maybe we can reopen this or open a new ticket once new model servers with different authentication methods pop up.

@hwbllmnn
Copy link
Collaborator

hwbllmnn commented Oct 1, 2024

Note #47 regarding anonymous process access.

@hwbllmnn
Copy link
Collaborator

hwbllmnn commented Oct 2, 2024

It should be better specified what exactly may happen for anonymous users, e.g. if they run processes, will job results be stored indefinitely? Will layers be created in Geoserver and be stored indefinitely? @herzogrh

@hhmric
Copy link
Collaborator

hhmric commented Oct 11, 2024

I guess it would be good to add a configurable number of hours until results of unauthorized users are deleted. The deletion should include both the saved results in the database and the layers in the GeoServer component. What do you think, @herzogrh ?

@herzogrh
Copy link
Member Author

Yes I think that's a good solution. I suppose only models which do not require a lot of computational power would be available to unauthorized users, so they would typically receive the results quite fast. Given that, it would be the easiest way if they'd have to wait for their current job, but not see any other jobs that were run by unauthorized users.

@hwbllmnn
Copy link
Collaborator

How do we decide which models do not require a lot of computational power, should this not be configurable?

@herzogrh
Copy link
Member Author

Yes, this should be configured

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request musthave "Must have" prioritization for the project
Projects
None yet
Development

No branches or pull requests

3 participants