[keycloak-dev] [authz] All permissions must pass?
Bill Burke
bburke at redhat.com
Sat Apr 1 15:37:15 EDT 2017
Policy1: has role FOO, Unanimous, POSITIVE
Policy2: has role BAR, Unamious, POSITIVE
Permission 1: Policy 1 Resource x, Scope y. Unanimous. POSITIVE
Permission 2: Policy 2 Resource x, Scope y. Unamimous. POSITIVE
User role mapping FOO. Evaluate. Failure, User does not have Scope y
on Resource x.
If I remove permission 1 and 2, and aggregate Policy 1 and Policy 2 with
Affirmative permission, it does evaluate correctly. I would actually
prefer this behavior, but if I depend on that behavior, I don't want it
changing on me.
Can you please map out how multiple permissions are supposed to evaluate?
On 4/1/17 3:22 PM, Pedro Igor Silva wrote:
> Sure, if you are getting different results it is a bug. Will look at
> that. Will try to simulate and will ask you for more info if needed.
>
> On Sat, Apr 1, 2017 at 4:20 PM, Bill Burke <bburke at redhat.com
> <mailto:bburke at redhat.com>> wrote:
>
> The evaluator can't be different than what is returned in the
> RPT,otherwise, what is the point of the evaluator?
>
>
> On 4/1/17 2:19 PM, Pedro Igor Silva wrote:
>> The evaluator may give you this output. But what about the
>> permissions you got in the token (that 'Show Authorization Data`
>> link on top of the result page) ? If you got PERMIT for a scope
>> you should see it in the token.
>>
>> On Sat, Apr 1, 2017 at 1:20 PM, Bill Burke <bburke at redhat.com
>> <mailto:bburke at redhat.com>> wrote:
>>
>> So all permissions must pass when evaluating a resource/scope
>> authorization? Just did some testing in admin console. I have 2
>> permissions. I used the policy evaluator for a
>> resource/scope combo.
>> One permission passes, the other fails. Evaluator result is DENY:
>>
>>
>> Result
>> *DENY*
>> Scopes
>> No scopes available.
>> Policies
>> # *map.role.permission.realm-management.manage-authorization
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/permission/scope/776b79cf-57e2-4b55-b9e5-84195c89fd7a
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/permission/scope/776b79cf-57e2-4b55-b9e5-84195c89fd7a>>*decision
>> was*PERMIT*by*UNANIMOUS*decision.
>>
>> * *role.policy.realm-managementmanage-users
>>
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/29968cd1-f44e-47db-868d-c7bd61b827dd
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/29968cd1-f44e-47db-868d-c7bd61b827dd>>*voted
>> to*PERMIT*.
>> * *role.policy.realm-managementmanage-authorization
>>
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/c4da0818-432a-41d2-94a8-0fc08051a609
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/c4da0818-432a-41d2-94a8-0fc08051a609>>*voted
>> to*PERMIT*.
>>
>> # *role-mapper-permission
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/permission/scope/e8acb66c-fe1f-4310-946a-fbb638449e77
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/permission/scope/e8acb66c-fe1f-4310-946a-fbb638449e77>>*decision
>> was*DENY*by*UNANIMOUS*decision.
>>
>> * *role-mapper
>>
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/41b7d1fe-c40f-4437-93d2-aa5768227fd4
>> <http://localhost:8180/auth/admin/master/console/#/realms/test/clients/b13a8867-5d75-4c8b-8927-5e806bd77518/authz/resource-server/policy/role/41b7d1fe-c40f-4437-93d2-aa5768227fd4>>*voted
>> to*DENY*.
>>
>> _______________________________________________
>> keycloak-dev mailing list
>> keycloak-dev at lists.jboss.org
>> <mailto:keycloak-dev at lists.jboss.org>
>> https://lists.jboss.org/mailman/listinfo/keycloak-dev
>> <https://lists.jboss.org/mailman/listinfo/keycloak-dev>
>>
>>
>
>
More information about the keycloak-dev
mailing list