Hi Sudhakar,

On Jun 25, 2018, at 2:12 PM, Pamidighantam, Sudhakar 
<[email protected]<mailto:[email protected]>> wrote:

when you say one can clone,  this newly cloned profile will have a separate 
identity with no privileges available for the original as the user who clones 
may not inherit those privileges, right?!

Well, I’m not quite sure what you mean by privileges. Crucially, a 
GroupResourceProfile’s GroupComputeResourcePreference defines a login username, 
a credential store SSH token to use (or it may not specify one and use the 
gateway default) and optionally an allocation project number. There are other 
details but these are the more important ones specifying how to access the 
resource and how to charge jobs submitted.  A user who has READ access to such 
a profile can see all of these details and can recreate a new profile with the 
same details.

If this is the case this should be OK. But we should  make sure privileges such 
as allocations and authorizations are not transferred in the cloning process 
but need to be set/validated separately. Just hiding may not work as folks with 
programmatic access may still mess things up.

I agree, just hiding may not work, especially since not all fields may be 
specified since the gateway (in the GatewayResourceProfile) may define some 
default values here.

I’m thinking the more secure approach would be to apply group based 
authorization to credential store tokens (what I called option #3 in the first 
email in this thread). This way another user can’t just copy how to 
authenticate to a compute resource.

Thanks,

Marcus

Reply via email to