Hi Colin,

On Wed, Mar 11, 2015 at 12:09 AM, Colin Roy-Ehri <col...@wso2.com> wrote:

> +1 for option 1.a. Because this admin feature should be accessible by the
> Subscriber role.  Preventing that role from accessing the admin services
> would complicate the use of the service.
>
> Also, for point 3. "Exposing a service to register scopes & resources",
> the new admin service access should be accessible by the Creator and/or
> Publisher roles.
>
Yes, the new service should be accessible by the Creator. Thanks for
bringing this up.

>
> Thanks,
> Colin Roy-Ehri
> Software Engineer
> *WSO2, Inc. : wso2.com <http://wso2.com/>*
> *Mobile*          : 812-219-6517
>
> On Tue, Mar 10, 2015 at 1:39 PM, Amila De Silva <ami...@wso2.com> wrote:
>
>> Hi All,
>>
>> While carrying out development, we came through several gaps that
>> prevents IS to be seamlessly used as an Authorization Server.
>> 1. Ability for subscribers to invoke OAuthAdminService.
>> Subscribers log into the store create Applications , Subscribe to API and
>> then Register the applications with Authorization Server (at this point an
>> OAuth app is created in IS) to get Consumer Key/Secret pair. Until now API
>> Manager has been registering Apps by directly writing to DB
>> (IDN_OAUTH_CONSUMER_APPS , a table that should be written only through IS).
>> But in future we’ll be creating the OAuthApp by calling OAuthAdminService.
>> The problem  is, this being an admin service, only the users with admin
>> privileges can invoke this. But subscribers log into the store are only
>> required to have subscribe permission. Two options are available to solve
>> this ;
>>
>>     a. Reducing permission of the Admin Service.
>>
>>     b. Changing the Service in such a way that an authenticated admin
>> user can create an OAuth App behalf of another user.
>>
>> This issue is discussed in the thread "[APIM] Decoupling Authorization
>> Server - Authenticating with Identity Server from API Store"
>>
>> 2. Need an additional grant handler for creating Application Access
>> Tokens.
>> Plans is to create Application Access Token using an extended grant type.
>> For API Manager to work seamlessly with IS (without any feature
>> installation), this new grant type needs to be shipped with IS.
>>
>> 3. Exposing a service to register scopes & resources
>> At the time of creating an API, creators have the ability to indicate
>> which scopes are needed for accessing a given resource. These scopes are
>> referred when issuing an access token. Currently we are saving the scopes
>> in IDN_OAUTH2_SCOPE table and resource-scope mapping in
>> IDN_OAUTH2_RESOURCE_SCOPE table through a direct DB write. Since writing to
>> these tables is the responsibility of the Authorization Server, a service
>> should be provided for creating scopes & resources.
>>
>>
>> 4. Checking whether the user is allowed to have a requested scope when
>> issuing tokens
>> API Manager has extended the default behaviour of issuing tokens. When a
>> token is requested for a scope, IS issues the token without performing
>> additional checks. In API Manager, a scope can be associated with a role,
>> so that only the users having the particular role will be given access
>> tokens generated for that scope. This implementation should also be shipped
>> with IS.
>>
>> --
>> *Amila De Silva*
>>
>> WSO2 Inc.
>> mobile :(+94) 775119302
>>
>>
>>
>> _______________________________________________
>> Architecture mailing list
>> Architecture@wso2.org
>> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>>
>>
>
> _______________________________________________
> Architecture mailing list
> Architecture@wso2.org
> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>
>


-- 
*Amila De Silva*

WSO2 Inc.
mobile :(+94) 775119302
_______________________________________________
Architecture mailing list
Architecture@wso2.org
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to