[ https://issues.apache.org/jira/browse/AIRAVATA-1624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14351367#comment-14351367 ]
Suresh Marru commented on AIRAVATA-1624: ---------------------------------------- Hi Hasini, Some of your points in the discussion seem to indicate you assume Airavata will be deployed as a stand alone. But we are intending for it to be deployed as a tenanted platform. Will your design change if a single deployment has to serve all three use cases (gateways with diverse user management scenarios)? Suresh > [GSoC] Securing Airavata API > ---------------------------- > > Key: AIRAVATA-1624 > URL: https://issues.apache.org/jira/browse/AIRAVATA-1624 > Project: Airavata > Issue Type: New Feature > Components: Airavata API > Reporter: Suresh Marru > Labels: gsoc, gsoc2015, mentor > Attachments: Securing_ARAVATA_API_V1.pdf > > > Apache Airavata uses Thrift based API's for external facing API's and for > system internal CPI's. The API's need to be secured adding authentication and > authorization capabilities. > The Authentication need to ensure only approved users/clients can > communicate. Similarly clients should only interact with valid servers. > Authorization need to be enforced to ensure only users with specific roles > can appropriately access specific API's. As an example, administrative roles > should be able see all the users experiments where as end users can only see > his/her data and not access other information (unless explicitly shared). > Earlier GSoC project focused on this topic has relavent discussion. > https://cwiki.apache.org/confluence/display/AIRAVATA/GSoC+2014+-+Add+Security+capabilities+to+Airavata+Thrift+services+and+clients -- This message was sent by Atlassian JIRA (v6.3.4#6332)