[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Access control [was: action RPC I-D]



Hello,
I feel that we should be careful not to make access control to complicated. While technically it is possible to design a good, fine grained access control model, I fear the user (operator) will have difficulties understanding it.

I see that read/write (and possibly disturb traffic) are three easy to understand concepts that might be executed by different people in the network operator's organization. On the other hand I don't see who would be the operator who is allowed to modify a route(or a customer), but not to create a new one.

I agree that operationally separating delete, replace, etc. is a useful notion, but I don't see the need for the same with access control.

Balazs

Andy Bierman wrote:
Balazs Lengyel wrote:
Hello,
You are right, we need access control.

For this reason each action defined in the data model should be defined as read/write/disturb-traffic. read: it only reads configuration and state data and doesn't effect the traffic
write: it writes configuration data, but does not disturb the traffic
disturb-traffic: means it can do anything.

IMO, a clean access control model for NETCONF need to recognize
the RPC model and the configuration datastore architecture.

First, there is the RPC method, defined by a QName.
The user must have access to invoke the RPC method.

Completely independent of that is the data access control model
applied to all configuration datastores.  The NETCONF operations
are create, delete, merge, and replace.  For access control purposes,
merge and replace operations are treated as a 'create' if the target
data instance does not exist.

The granularity could be a coarse as read/write, but that would
totally defeat the purpose of create and delete operations in
the edit-config method.  An access control that matches the
capabilities of the protocol needs to include read/write/create+delete
as the 3 levels of data access (4 if you count 'none').

It makes no sense to have an 'exec' or 'disturb-traffic' access
control classification in the data space.  Either the user can
invoke the RPC method or not.  Remember, it is the PROTOCOL that
needs an access control model, not blobs of XML.  IMO, focusing the ACM
on the XML is the wrong approach.



One can debate that these are the good categories for access control. Still the basic statement is that for each action defined in the data model you need to specify it's access properties in the data model as well.
Balazs

Andy Bierman wrote:
Your access control model should be more robust than
simply allowing user X to do anything called <action>.
I don't see what benefit an intermediate SW component
can realize if an extra generic container is added to <rpc>.





Andy


--
Balazs Lengyel                       Ericsson Hungary Ltd.
TSP System Manager
ECN: 831 7320                        Fax: +36 1 4377792
Tel: +36-1-437-7320     email: Balazs.Lengyel@ericsson.com

--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>