Larry McCay created KNOX-3143:
---------------------------------
Summary: Add authorization related metadata to the issuance of
CLIENT_ID and CLIENT_SECRET
Key: KNOX-3143
URL: https://issues.apache.org/jira/browse/KNOX-3143
Project: Apache Knox
Issue Type: Improvement
Components: Server
Reporter: Larry McCay
Assignee: Larry McCay
Fix For: 2.2.0
Current support for CLIENT_ID and CLIENT_SECRET for a client credentials flow
leaves authorization up to policies and/or ACLs setup specifically for the
client_id with some optional metadata available for searching and filtering
tokens based on user name, comments, arbitrary tags.
We can probably do better than this and potentially add some additional
identity characteristics to the client_id that could at least be used within
audit logs.
My initial thinking around authorization and scopes was centered on the
credentials representing some external user for which policies can be
explicitly written.
I am revisiting this context to include AI Agents and/or MCP Servers. While
these tools may be leverage by an individual, they shouldn't necessarily have
the same permissions as the individual. This is where the RBAC notion of user
being applied to agents starts to break down.
A user that has clearance for accessing certain resources themselves should NOT
delegate that clearance to an agent that may make arbitrary decisions as to
where to access it from or send it to. Therefore, we should add the notion of
scopes to constrain what tools are able to do in the context of an extension of
the user's identity.
This will require us to consider scopes within service level authorization
within the Knox Gateway as well as an endpoint from which downstream components
can look up the scopes for authorization decisions by the PEPs within the
platform.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)