Closed hpdempsey closed 2 years ago
related issue #76 #77 #30
Asked Michael Daitzman to review requirements.
Looks good. I'll use it as a basis for discussions with legal, etc. who may have some stuff to add in.
Thanks, those requirements are pretty extensive :) If one of those influences a design decision, we should pull them into the ADR.
Can we start with the SSO ADR? https://github.com/operate-first/blueprint/pull/74
@tumido made a point to aggregate SSO from multiple sources
Great info. So the AUP would negate the need for a EULA, but perhaps may need some language to cover the data and it's licensing.... (not a lawyer).
Yes, nice summary @billburnseh
Based on your excellent explanations....credit where credit is due! Thanks!
Thank you @hpdempsey ! :+1:
I think we need to consider "mingling" and interaction of 2 kinds of users - those who have access to research institutions and can login via academic SSOs and those who can't - independent users, RH/IBM/other engineers, users accessing a demo or attending a workshop, which requires them to interact with the platform (e.g. ODH demos for deploying various components etc.).
Both these types of users want to access our platform. While the first can login via academic SSO, the later one can login via email or possibly github only (Those are the only credentials we can use to identify them and are least intrusive.) For these users we still have the need for an EULA in some form.
Mind that those non-academic users are also interested in taking data in/out of the platform.
Additionally to that Operate First will soon operate clusters outside of MOC, which doesn't have this DUAs and IRBs that are enforced MOC. I'm not sure how we want to implement that, since we would like to have unified experience for all of the users, while it doesn't make any sense for a user accessing non-MOC cluster to have to comply with MOC policies directly (like being presented with MOC AUP).
While I understand the need for privacy policy and EULAs and what not, I'm not versed in this topic at all. So feel free to tell me if I'm totally missing the point now. :slightly_smiling_face:
Aand I've just read the Data license choice for Operate First email thread. Some of my concerns are already voiced there or explained. Just don't mind me :smile:
You're not missing anything (except maybe some sleep). I don't think we've clarified yet how many stand-alone environments we will have, and the extent to which we'll be mixing academic and non-academic users in each environment. There are ways to connect commercial or workshop users to an academic SSO systems by having a second compatible certificate authority. NCSA operates one that is compatible with InCommon, for example. But we probably won't want to go to that extra effort, so systems with mixed types of users will have to support both AUP with SSO and EULAs. It's also possible we separate the two environments, but I hope we don't. Also, the DUAs for an academic environment apply to any ops data, regardless of the type of user (academic or not) who the data is associated with.
Thanks for your comments.
On Wed, Apr 28, 2021 at 5:48 PM Tom Coufal @.***> wrote:
Aand I've just read the Data license choice for Operate First email thread. Some of my concerns are already voiced there or explained. Just don't mind me 😄
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/operate-first/blueprint/issues/79#issuecomment-828802142, or unsubscribe https://github.com/notifications/unsubscribe-auth/AMGMIELZCURNFGWPGUDDRY3TLB7CNANCNFSM43TAHSUQ .
I'd love to see the thread @tumido referenced above. Re. SSO and academic above - two of the major academic login options both route via cilogon.org which includes both google (many companies including redhat.com logins) and GitHub as oauth providers so that they support non-academic users. Not sure of the "rules of engagement" for them.
@msdisme forwarded :slightly_smiling_face:
2 examples for Acceptable Use Policy
https://www.osgconnect.net/aup https://www.chameleoncloud.org/terms/
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
/remove-lifecycle stale
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close
.
/lifecycle rotten
Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen
.
Mark the issue as fresh with /remove-lifecycle rotten
.
/close
@sesheta: Closing this issue.
The MOC, NERC and MGHPCC have existing requirements for granting different types of users access to operations data. These are not fully specified in the blueprint or ADRs for the current open issues related to access control. Collect this information and decide how to add it to the design document and relevant open issues.