Re: Finer grained security

2017-05-11 Thread Swapnil Bawaskar
Thanks for feedback! I have tried to incorporate this on our wiki: https://cwiki.apache.org/confluence/display/GEODE/Finer+grained+security. Comments welcome. On Thu, Apr 27, 2017 at 1:33 PM John Blum wrote: > +1 to Jake's comments, and is a fundamental property of Java's security > internally.

Re: Finer grained security

2017-04-27 Thread John Blum
+1 to Jake's comments, and is a fundamental property of Java's security internally. On Thu, Apr 27, 2017 at 1:09 PM, Jacob Barrett wrote: > Typical solution to the X service needs to create something it service Y > where user has permission to X but not to Y is to treat the actions on Y > perfor

Re: Finer grained security

2017-04-27 Thread Jacob Barrett
Typical solution to the X service needs to create something it service Y where user has permission to X but not to Y is to treat the actions on Y performed by X to be trusted. Often I have seen this implemented such that after asserting permission on "create" on X that X performs actions on Y as a

Re: Finer grained security

2017-04-27 Thread Michael Stolz
We have seen users who need per-Region permission for Data read/write, so there is precedent there at least. -- Mike Stolz Principal Engineer, GemFire Product Manager Mobile: +1-631-835-4771 On Thu, Apr 27, 2017 at 2:11 PM, pulkit chandra wrote: > For per instance permission, I would say look f

Re: Finer grained security

2017-04-27 Thread pulkit chandra
For per instance permission, I would say look for the evidence. Do we have evidence that customers want per instance permission? If not may be implement minimally in the first cut and validate with customers if they want per instance model? About Lucene concern, It is in fact good to provide permi

Re: Finer grained security

2017-04-26 Thread Dan Smith
I agree that async event queues seem like a different case than wan or disk. In that case you are not using anything that creating a region doesn't do. Shouldn't creating a region be DATA:MANAGE:DISK? Requiring DATA privileges for a region without disk and CLUSTER privileges for a region with disk

Re: Finer grained security

2017-04-26 Thread Diane Rose Hardman
One more possible complication is that creating a Lucene index will also create an AsyncEventQueue. Today the required permission to create the AEQ is DATA:MANAGE which coincidentally nicely matches the permission required to create an OQL index. Pulling out the AEQ as a separate resource will affe

Re: Finer grained security

2017-04-25 Thread Jinmei Liao
DATA:*:RegionA would allow you to only operate that region but not all of them. if we want to control a specific wan, maybe we add a fourth parameter: cluster:*:wan:wanName, same goes for Disk etc. On Tue, Apr 25, 2017 at 3:03 PM, Jacob Barrett wrote: > Think further, what about the team that a

Re: Finer grained security

2017-04-25 Thread Jacob Barrett
Think further, what about the team that ask that I be able to mange a region not all regions, or a wan not all wan. It may be time to think about a full per instance / named resource based security model. On Tue, Apr 25, 2017 at 2:59 PM Jared Stewart wrote: > +1 > > I think it would also be a go

Re: Finer grained security

2017-04-25 Thread Jared Stewart
+1 I think it would also be a good idea to move the current operations permitted by CLUSTER:MANAGE ( stop server, alter runtime, etc) to require the more specific CLUSTER:MANAGE:MEMBER in order to avoid ambiguity. (This is not a breaking change since CLUSTER:MANAGE implies CLUSTER:MANAGE:MEMB