[ 
https://issues.apache.org/jira/browse/AIRAVATA-1624?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14571974#comment-14571974
 ] 

Hasini Gunasinghe edited comment on AIRAVATA-1624 at 6/4/15 2:04 AM:
---------------------------------------------------------------------

Hi Supun,

Thanks for the comments. 
Concerning multi-tenancy, yes, I have considered it when designing the solution 
(please refer the 6th comment on this jira). Once the architectural details of 
multi-tenanted Airavata is finalized (i.e: how a tenant will be identified, how 
the configuration files will be cloned and stored for each tenant etc), current 
security manager can be easily extended to support multi-tenancy accordingly. 
AuthzToken already contains a properties map for passing user attributes which 
can be used to pass the tenant identifier or we can introduce a separate field 
based on the tenant identifier that will be used in Airavata.

Concerning the TLS support, thanks for informing that thrift doesn't support 
TLS for PHP client. I was anyway planning to make the communication over TLS 
configurable, so that any one who prefers performance over security can use the 
communication without TLS. For that, we will have two endpoints: one exposed 
over TLS and the other one exposed over normal transport. Therefore, the 
clients written in languages for which thrift doesn't support TLS, can connect 
to the endpoint which is not exposed over TLS.

Thanks,
Hasini.
  


was (Author: hasinig):
Hi Supun,

Thanks for the comments. 
Concerning multi-tenancy, yes, I have considered it when designing the solution 
(please refer the 6th comment on this jira). Once the architectural details of 
multi-tenanted Airavata is finalized (i.e: how a tenant will be identified, how 
the configuration files will be cloned and stored for each tenant etc), current 
security manager can be easily extended to support multi-tenancy accordingly. 
AuthzToken already contains a properties map for passing user attributes which 
can be used to pass the tenant identifier or we can introduce a separate field 
based on the tenant identifier that will be used in Airavata.

Concerning the TLS support, thanks for informing that thrift doesn't support 
TLS for PHP client. I was anyway planning to make the communication over TLS 
configurable, so that any one who prefers performance over security can use the 
communication without TLS. For that, we will have two endpoints: one exposed 
over TLS and the other one exposed over normal transport. So the clients 
written in languages for which thrift doesn't support TLS, can connect to the 
endpoint which is not exposed over TLS.

Thanks,
Hasini.
  

> [GSoC] Securing Airavata API
> ----------------------------
>
>                 Key: AIRAVATA-1624
>                 URL: https://issues.apache.org/jira/browse/AIRAVATA-1624
>             Project: Airavata
>          Issue Type: New Feature
>          Components: Airavata API
>            Reporter: Suresh Marru
>              Labels: gsoc, gsoc2015, mentor
>             Fix For: WISHLIST
>
>         Attachments: Securing_ARAVATA_API_V1.pdf
>
>
> Apache Airavata uses Thrift based API's for external facing API's and for 
> system internal CPI's. The API's need to be secured adding authentication and 
> authorization capabilities. 
> The Authentication need to ensure only approved users/clients can 
> communicate. Similarly clients should only interact with valid servers. 
> Authorization need to be enforced to ensure only users with specific roles 
> can appropriately access specific API's. As an example, administrative roles 
> should be able see all the users experiments where as end users can only see 
> his/her data and not access other information (unless explicitly shared). 
> Earlier GSoC project focused on this topic has relavent discussion. 
> https://cwiki.apache.org/confluence/display/AIRAVATA/GSoC+2014+-+Add+Security+capabilities+to+Airavata+Thrift+services+and+clients



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to