-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Policy support #161
Comments
Summary of the current thoughts:
|
TODO:
|
Merged
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
In many parts of DIRAC we need to be able to configure policies about what information can be accessed. For example, in the WMS the
JobPolicy
class andv
option is used to be able to configure if users can access each other's jobs.My current suggestion for this is to extend the existing security properties to be finer-grained, for example the various WMS access configuration methods could be three separate security properties like
JOB_CREATE
,JOB_MANAGE
andJOB_MONITOR
. We then need to handle 4 different cases of granularity with which these properties can be applied:For example, some of the current DIRAC options can be mapped as:
GlobalJobsInfo
in the CS is equivilent to giving all groupsJOB_MONITOR(vo)
JOB_ADMINISTRATOR
in the CS is equivilent toJOB_MANAGE(vo)
andJOB_MONITOR(vo)
NormalUser
isJOB_CREATE(own)
,JOB_MANAGE(own)
andJOB_MONITOR(own)
JOB_SHARING
is roughly the same asJOB_MANAGE(group)
andJOB_MONITOR(group)
This will hopefully lead to a clean implementation of the "Installation Admin VO" with admins having
JOB_MANAGE(all)
andJOB_MONITOR(all)
.This is the groundwork for #23.
The text was updated successfully, but these errors were encountered: