+1.

That's why I mentioned OU. An OU can be a path not only String, for
example /root/domain1/Administrators/.


在 2009-05-05二的 11:52 -0400,Harmeet Bedi写道:
> I think an important thing missing is parentId in SecurityGroup.
> Adding that would give you heirarchy. Groups sort of are roles. Group has 
> association with Subject(UserLogin through UserLoginSecurityGroup), 
> Permission(SecurityGroupPermission), Permission is tied implicitly to action 
> and resource.. Sort of RBAC.
> 
> Harmeet
> 
> ----- Original Message -----
> From: "Ruth Hoffman" <rhoff...@aesolves.com>
> To: dev@ofbiz.apache.org
> Sent: Tuesday, May 5, 2009 11:05:12 AM GMT -05:00 US/Canada Eastern
> Subject: Re: Brainstorming: Security Configuration Patterns
> 
> Hi All:
> One pattern I worked with some time ago is called Role Based Access 
> Control (RBAC). This would be similar to #4 below, where you have a 
> "role" - with permissions associated with that role - defining 
> authorization levels. If you are interested in exploring this further, 
> I'd be happy to elaborate.
> 
> Ruth
> David E Jones wrote:
> >
> > This thread is specifically for discussing possible configuration 
> > patterns to use in OFBiz going forward. Please keep other discussion 
> > in another thread, including the merits of each possibility... let's 
> > just brainstorm in this thread.
> >
> > To get things started, here are the patterns that have been discussed 
> > recently (in high level terms, we can get into implementation and 
> > specific practices later on), these are in no particular order:
> >
> > 1. artifacts responsible for their own security (especially services 
> > and screens), and security permissions are referred to directly (ie 
> > the actual permissions are configured directly in the XML tags for the 
> > artifact)
> >
> > 2. artifacts responsible for their own security, and no direct 
> > references are used and instead an indirect security control is 
> > referred to; this is basically the permission service model we've been 
> > using where a permission service is basically a security policy that 
> > refers to permissions, can query/filter/whatever to do record level 
> > security, and in customization the permission service can be 
> > overridden or its function changed by ECA rules without touching any 
> > OOTB code or configuration
> >
> > 3. a hybrid of #1 and #2 where artifacts refer directly to permissions 
> > and there is external configuration based on those permissions that 
> > can add other qualifying permissions and/or invoke logic to change how 
> > that permission is evaluated (ie override the default behavior of 
> > requiring the user to have that permission and either add additional 
> > constraints or allow alternative constraints even if the user does not 
> > have the original permission that triggered it all); this is recursive 
> > so that if an alternative permission is configured that permission may 
> > also have further alternative permissions; also being recursive if 
> > attached logic evaluates other permissions that may have alternative 
> > permissions and/or permission logic attached to them; as I understand 
> > what Andrew has implemented, this is the pattern he followed
> >
> > 4. artifacts are not responsible for their own security except to 
> > specify whether any sort of permission is required or not (ie a 
> > require-permission attribute, would be true by default; for example 
> > most ecommerce screens would have this set to false); access control 
> > would be configured externally so that you can configure access at the 
> > most granular level possible (we would go ALL the way here, including: 
> > screens, services, forms, form fields, menu items, tree nodes, etc, 
> > etc); the access control tools would have patterns and features to 
> > facilitate grouping of artifacts, grouping of users (ie just use the 
> > current SecurityGroup entity), and support for both functionality 
> > access and record-level access
> >
> > Can anyone thing of other patterns? Again, PLEASE do not comment on 
> > which one you like better or what you think the advantages or 
> > disadvantages are of each in this thread (of course, definitely think 
> > about such things and feel free to comment in other threads, I just 
> > want this to be a "hat's off" (yes, that is a reference to Six 
> > Thinking Hats by Edward de Bono; anyone who hasn't read that should 
> > give it a go!) brainstorming session.
> >
> > Thank You!
> > -David
> >
> >
> 

Reply via email to