[ 
https://issues.apache.org/jira/browse/ARTEMIS-4582?focusedWorklogId=905958&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-905958
 ]

ASF GitHub Bot logged work on ARTEMIS-4582:
-------------------------------------------

                Author: ASF GitHub Bot
            Created on: 20/Feb/24 14:52
            Start Date: 20/Feb/24 14:52
    Worklog Time Spent: 10m 
      Work Description: gtully commented on PR #4820:
URL: 
https://github.com/apache/activemq-artemis/pull/4820#issuecomment-1954384492

   > Couple of question...
   > 
   > 1. One of the things that `management.xml` let you do was configure remote 
JMX connectivity. How do I do that with this?
   management.xml will remain, this will just replace the authorization 
section. 
   
   > 2. One nice thing about `management.xml` is that you didn't have to muck 
around with system properties. Any chance this could be configured via 
`broker.xml` instead of `javax.management.builder.initial`? Perhaps a new 
`<management>` block would be useful here.
   
   the system property is important because I want to guard the platform mbean 
server, and this is created on startup. Typically our logging causes it is be 
instantiated. When the platform mbean server is guarded and jolokia exposes it, 
the need for a jmx connector diminishes. With the management wrapper of the 
broker, we were late setting the guard in the past.  
   
   > 3. There is a fair bit of documentation about `management.xml` in 
`management.adoc`. Could you provide something analogous (or even more 
comprehensive) for this? A few simple use-cases with corresponding 
configuration would go a long way in helping users & developers understand how 
it works.
   
   sure. it is considerably simpler, with a mapping from objectName to address, 
and methods split into update or view permissions.
   
   > 4. The existing default `management.xml` has recommended settings (e.g. 
read-only access to non-Artemis MBeans). I think we should have something 
similar for this as well. Is that possible?
   
   that is a good idea, one thing that may get in the way is the default # 
security-settings-match. that will be applicable to jmx too but won't typically 
have the view role.
   
   but a security-settings-match jmx.# view role would do it.
   
   




Issue Time Tracking
-------------------

    Worklog Id:     (was: 905958)
    Time Spent: 0.5h  (was: 20m)

> add view and update permissions to augment the manage rbac for control 
> resources
> --------------------------------------------------------------------------------
>
>                 Key: ARTEMIS-4582
>                 URL: https://issues.apache.org/jira/browse/ARTEMIS-4582
>             Project: ActiveMQ Artemis
>          Issue Type: Improvement
>          Components: Broker, Configuration, JMX, Web Console
>    Affects Versions: 2.31.0
>            Reporter: Gary Tully
>            Assignee: Gary Tully
>            Priority: Major
>          Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> we have the manage permission that allows sending to the management address, 
> to access any control resource. We don't however distinguish what a user can 
> do.
> We should segment control operations into categories: CRUD provides a basis
> view for get/is (Read)
> update for set or operations that mutate or modify.
> We allow this sort of configuration via management.xml for jmx mbean access 
> but using a different model based on object name.
> All of the mbeans delegate to the control resources.
> If we add these two additional permissions then we can have a single rbac 
> model (that supports config reload) and more granularity on control resource 
> access from the management address.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to