eclipse-arrowhead / roadmap

Eclipse Public License 2.0
5 stars 9 forks source link

Discussion: Authentication Core System #88

Open borditamas opened 4 months ago

borditamas commented 4 months ago

Following the GSoSD Review Discussion Point 6: The Role of an Authentication System? #64

Authentication Core System needs to be designed as soon as possible, because all the other core and supporting systems depend on it in a secure local cloud, therefore we have to have a clear view on how its service(s) should work.

Previously the discussion was about that there should be at least two services (or one service with two operations). One for providing identity to an application system and an other for verifying an identity.

Providing identity

Before using any features of a local cloud the systems have to ask for any indentity which is valid within that local cloud. The systems has to provide implementation specific credentials (X509 cert, identifier & password, etc...). If the credentials are valid, the authentication core system returns a system identifier (this can be the provided identifier or generated or the CN from the X509, etc...) and an identity token. If the credentials are not valid, the authentication core system returns ann error response.

The system should use the returned identifier as the name of the system during all the interactions within the local cloud. Also, every service consumption request has to contain the identity token.

Verifying identity

Before any service response providers should verifying the identity of the requester by calling this service/operation. The input parameters are the requester system's name and its identity token. The possible responses ar OK and error.

The provider should fulfill the service request only if the verification has suceeded.

Our concerns

@jerkerdelsing @PerOlofsson-Sinetiq @emanuelpalm @DavidRutqvist @palvarga

borditamas commented 4 months ago

@AlexChiquito @emanuelpalm @PerOlofsson-Sinetiq Could you please provide Sinetiq's feedback before the next RoadMap (05.02) in order to being able to discuss it there? As you know, last time the 14th of May (before AIMS 5.0 GA) was agreed to target the specification being finalized, so we don't have so much time.

jerkerdelsing commented 2 months ago

AITIA to add interaction diagram to further clarify the threat and their proposed solution. From Roadmap WG meeting 240705

borditamas commented 2 weeks ago

Please see the requested diagram.

auth_interactions