I'm just trying to define the initial operations we want to cover and
how fine grain we might want to go. When I wrote "Admin can" below, I
do not discuss how the admin is defined. I'll get into what default
policies will be later on as I learn the limitations of the Authz
service. I want to implement as you describe, not defining permissions
PER ADMIN, but based on group membership and role mappings of the admin
user.
On 3/23/17 1:54 AM, Stian Thorgersen wrote:
That seems to cover the use-cases I had in mind. I'd also like to
highlight what Marek pointed out around protocol mappers. That was
found as one of the issues with dynamic client registration that we
had to tackle. Basically it could have been used for priviledge
escalation through the client registration services. We solved that by
introducing the client registration policies. Maybe we need different
policies applied to different admins.
How would this be encoded? Rather than having lists of admin can
access this, admin can access that. Would it not be better to have
some role or group where a member of that role/group can access a set
of users, a set of roles, a set of clients, etc..?
On 21 March 2017 at 22:10, Bill Burke <bburke(a)redhat.com
<mailto:bburke@redhat.com>> wrote:
Here's what we want to be able to manage for fine-grain admin
permissions for the 1st iteration. If you think we need more, let me
know, but I want to keep this list as small as possible.
User management
* Admin can only apply certain roles to a user
* Admin can view users of a specific group
* Admin can manage users of a specific group (creds, role
mappings, etc)
Group Management
* Admin can only manage a specific group
* Admin can only apply certain roles to a group
* Admin can only manage attributes of a specific group
* Admin can control group membership (add/remove members)
Client management:
* Admin can only manage a specific client.
* Admin can manage only configuration for a specific client and not
scope mappings or mappers. We have this distinction so that
rogues
can't expand the scope of the client beyond what it is allowed to.
* Service accounts can manage the configuration of the client by
default?
_______________________________________________
keycloak-dev mailing list
keycloak-dev(a)lists.jboss.org <mailto:keycloak-dev@lists.jboss.org>
https://lists.jboss.org/mailman/listinfo/keycloak-dev
<
https://lists.jboss.org/mailman/listinfo/keycloak-dev>