Hello,

Overall, the proposal looks good.

I would like to ask clarification to one item that wasn't clear to me from this documentation.

How is the implementation split into components and what type of components those are? This is important from the access control point of view (AccessControlManager in gSSO), because in order for it to do it's work the request needs to come directly from the requesting process and should not be forwarded between processes. So the authentication request should come directly from the application process to the gsignond, thus the RequestAuthData() should be implemented for example in a library loaded to the application.

For WRT applications and such where the process may not be 1:1 with the application there's additional field called "appctx" in the gSSO SecurityContext to define a sub-context within "sysctx" (SMACK label in Tizen). Bindings should fill in this item.

I understand that this just an example, but in slides 1 and 2 the gSSO ACL is "*" which is not recommended for storing anything else than public keys (X.509 or similar). It should be set to SMACK label on which the application has "rx" permissons. (r = Identity access, x = AuthSession access, w = IdentityInfo access)

Please also note that for OAuth, the gSSO IdentityInfo item called "Realms" needs to be set to match domain name of the particular Identity. For example "google.com" for Google accounts.


Best regards,

        - Jussi


_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to