You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current plan has been to solve access for resources in RRR through concept connections.
This analysis introduces a new concept
Terms
Resource Party - Avgiver, part ++++
Concept
The main concept of this approach is connecting the AccessList to the Resource through an XACML Policy. We introduce a new XACML policy we use for this authorization for the resource party.
AccessList
The accesslist will have a ID and have a set of organization members. Added a reference to a list will effectly give access to members of this list
Policy Example
The below policy shows the resource party policy for the
<xacml:Policyxmlns:xsl="http://www.w3.org/2001/XMLSchema-instance"xmlns:xacml="urn:oasis:names:tc:xacml:3.0:core:schema:wd-17"PolicyId="urn:altinn:example:policyid:1"Version="1.0"RuleCombiningAlgId="urn:oasis:names:tc:xacml:3.0:rule-combining-algorithm:deny-overrides">
<xacml:Target/>
<xacml:RuleRuleId="urn:altinn:example:ruleid:1"Effect="Permit">
<xacml:Description>A rule giving resource party that is part of the accelisst kv/approved brokers the right to perform read/write on the service kv_eiendomssalg</xacml:Description>
<xacml:Target>
<xacml:AnyOf>
<xacml:AllOf>
<xacml:MatchMatchId="urn:oasis:names:tc:xacml:3.0:function:string-equal-ignore-case">
<xacml:AttributeValueDataType="http://www.w3.org/2001/XMLSchema#string">kv/approved_brokers</xacml:AttributeValue>
<xacml:AttributeDesignatorAttributeId="urn:altinn:accesslistmember:part"Category="urn:oasis:names:tc:xacml:1.0:subject-category:access-subject"DataType="http://www.w3.org/2001/XMLSchema#string"MustBePresent="false"/>
</xacml:Match>
</xacml:AllOf>
</xacml:AnyOf>
<xacml:AnyOf>
<xacml:AllOf>
<xacml:MatchMatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal">
<xacml:AttributeValueDataType="http://www.w3.org/2001/XMLSchema#string">kv_eiendomssalg</xacml:AttributeValue>
<xacml:AttributeDesignatorAttributeId="urn:altinn:serviceresource"Category="urn:oasis:names:tc:xacml:3.0:attribute-category:resource"DataType="http://www.w3.org/2001/XMLSchema#string"MustBePresent="false"/>
</xacml:Match>
</xacml:AllOf>
</xacml:AnyOf>
<xacml:AnyOf>
<xacml:AllOf>
<xacml:MatchMatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal">
<xacml:AttributeValueDataType="http://www.w3.org/2001/XMLSchema#string">read</xacml:AttributeValue>
<xacml:AttributeDesignatorAttributeId="urn:oasis:names:tc:xacml:1.0:action:action-id"Category="urn:oasis:names:tc:xacml:3.0:attribute-category:action"DataType="http://www.w3.org/2001/XMLSchema#string"MustBePresent="false"/>
</xacml:Match>
</xacml:AllOf>
<xacml:AllOf>
<xacml:MatchMatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal">
<xacml:AttributeValueDataType="http://www.w3.org/2001/XMLSchema#string">write</xacml:AttributeValue>
<xacml:AttributeDesignatorAttributeId="urn:oasis:names:tc:xacml:1.0:action:action-id"Category="urn:oasis:names:tc:xacml:3.0:attribute-category:action"DataType="http://www.w3.org/2001/XMLSchema#string"MustBePresent="false"/>
</xacml:Match>
</xacml:AllOf>
</xacml:AnyOf>
</xacml:Target>
</xacml:Rule>
<xacml:ObligationExpressions>
<xacml:ObligationExpressionFulfillOn="Permit"ObligationId="urn:altinn:obligation:authenticationLevel1">
<xacml:AttributeAssignmentExpressionAttributeId="urn:altinn:obligation1-assignment1"Category="urn:altinn:minimum-authenticationlevel">
<xacml:AttributeValueDataType="http://www.w3.org/2001/XMLSchema#integer">3</xacml:AttributeValue>
</xacml:AttributeAssignmentExpression>
</xacml:ObligationExpression>
</xacml:ObligationExpressions>
</xacml:Policy>
Enabling Party authorization
The resource will have a boolean value telling PDP if party authorization is enabled.
If enabled, the PDP will load party policy from policy store
Task
Update Policy editor to support party authorization
Update policy editor to list access lists
Add policy store for party authorization policies
Update policy migration
Update PDP handling
Remove connections
To be decided
How to allow for party only authorization
In scope
No response
Out of scope
No response
Additional Information
No response
Analysis
No response
Conclusion
No response
The text was updated successfully, but these errors were encountered:
Description
The current plan has been to solve access for resources in RRR through concept connections.
This analysis introduces a new concept
Terms
Concept
The main concept of this approach is connecting the AccessList to the Resource through an XACML Policy. We introduce a new XACML policy we use for this authorization for the resource party.
AccessList
The accesslist will have a ID and have a set of organization members. Added a reference to a list will effectly give access to members of this list
Policy Example
The below policy shows the resource party policy for the
Enabling Party authorization
The resource will have a boolean value telling PDP if party authorization is enabled.
If enabled, the PDP will load party policy from policy store
Task
To be decided
In scope
No response
Out of scope
No response
Additional Information
No response
Analysis
No response
Conclusion
No response
The text was updated successfully, but these errors were encountered: