opengeospatial / ideas

Public repository for Innovation Program Ideas
20 stars 3 forks source link

Secure Workflow execution across security domains #100

Open hector-rodriguez opened 5 years ago

hector-rodriguez commented 5 years ago

Building upon the work performed on Testbed-15, the execution of secured workflows across security domains could be demonstrated provided that the following pre-requisites are fulfilled:

  1. Identity Provider (IDP) with API endpoints allowing secured retrieval and validation of user information by Clients and Services
  2. Policy Decision Point (PDP) with API endpoints allowing creation, edition, removal, and verification of access policies
  3. Resource catalogue with API endpoints allowing insertion and query of resources by Services and Clients
  1. Resource Discovery Phase
  2. Authentication Phase (both domains)
  3. Workflow Initialization Phase (solving M2M interactions and secured transation of outputs)
  4. Workflow Dry-Run Phase (test that all security constraints are fulfilled beforehand)
  5. Workflow Execution Phase
hector-rodriguez commented 5 years ago

Relevant use-cases: Service A1 (running on env. A) and B (running on env.B) are executed one after the other. Service A2 is a storage service on env. A.

  1. Service A1 is open but Service B requires elevated priveledges on environment B. Execution should fail on its Dry-Run phase.

  2. Service A1 requires Service B to have reading permissions over the execution data stored in A2. Whenever an execution ends for Service A1, data is stored in A2 and protected with a specific access scope. Service B needs to be authenticated in an M2M operation that decides if it has access to outputs. Execution should fail on its initialization phase due to service incompatibility.