[ 
https://issues.apache.org/jira/browse/AIRAVATA-1624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14568951#comment-14568951
 ] 

Hasini Gunasinghe edited comment on AIRAVATA-1624 at 6/2/15 11:07 AM:
----------------------------------------------------------------------

Hi all,

I have created a updated pull request[1] based on the previous pull request by 
merging it with the 0.16 master. It would be great if I could get to know if 
you are OK with the way API methods are changed with this solution, so that I 
could complete applying the same changes to all the API methods.

I have listed the steps a developer will have to follow if he/she wishes to 
enforce security on any method that will be added to the API in the future at 
https://cwiki.apache.org/confluence/display/AIRAVATA/Developer+Documentation+for+Securing+Airavata+API

As the security enforcement can be enabled/disabled at the Airavata server 
side, you do not need to run WSO2 IS every time the server is started, although 
these changes are applied.

[1] https://github.com/apache/airavata/pull/12
Thanks & Best Regards,
Hasini.


was (Author: hasinig):
Hi all,

I have created a updated pull request based on the previous pull request by 
merging it with the 0.16 master. It would be great if I could get to know if 
you are OK with the way API methods are changed with this solution, so that I 
could complete applying the same changes to all the API methods.

I have listed the steps a developer will have to follow if he/she wishes to 
enforce security on any method that will be added to the API in the future at 
https://cwiki.apache.org/confluence/display/AIRAVATA/Developer+Documentation+for+Securing+Airavata+API

As the security enforcement can be enabled/disabled at the Airavata server 
side, you do not need to run WSO2 IS every time the server is started, although 
these changes are applied.

Thanks & Best Regards,
Hasini.

> [GSoC] Securing Airavata API
> ----------------------------
>
>                 Key: AIRAVATA-1624
>                 URL: https://issues.apache.org/jira/browse/AIRAVATA-1624
>             Project: Airavata
>          Issue Type: New Feature
>          Components: Airavata API
>            Reporter: Suresh Marru
>              Labels: gsoc, gsoc2015, mentor
>             Fix For: WISHLIST
>
>         Attachments: Securing_ARAVATA_API_V1.pdf
>
>
> Apache Airavata uses Thrift based API's for external facing API's and for 
> system internal CPI's. The API's need to be secured adding authentication and 
> authorization capabilities. 
> The Authentication need to ensure only approved users/clients can 
> communicate. Similarly clients should only interact with valid servers. 
> Authorization need to be enforced to ensure only users with specific roles 
> can appropriately access specific API's. As an example, administrative roles 
> should be able see all the users experiments where as end users can only see 
> his/her data and not access other information (unless explicitly shared). 
> Earlier GSoC project focused on this topic has relavent discussion. 
> https://cwiki.apache.org/confluence/display/AIRAVATA/GSoC+2014+-+Add+Security+capabilities+to+Airavata+Thrift+services+and+clients



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to