Duplicating Scope policies between IAMs? #514
Replies: 1 comment
-
For each token issuer there is
That means there is no general way to grant access to the data between different VOs when client use tokens (I did not check how e.g. dCache symlinks works with tokens or similar mechanisms in xroot plugin that allows you to map namespace structure). Giving ATLAS user token with Same behavior currently apply to the user home directories, because I'm not aware of any special treatment of personal storage areas (home directories are mentioned in the WLCG JWT profile, but to be honest description of expected behavior is not completely clear to me). This means people in multiple VO gets different home directory per-VO and they'll not be able to move data between their different home directories. You could also configure different "doors" for home directories with shared I have to admit I did not completely get why you mentioned IAM policies. In case we decide to support home directories with tokens, we'll need per-user policy that looks like: "user |
Beta Was this translation helpful? Give feedback.
-
Hello,
I had a question from a service manager who anticipates that they will trust multiple IAM token issuers. They would like to use capabilities for specific paths, e.g.
This authorisation logic and knowledge is known by the service rather than by IAM at the moment. If we wanted to add it to IAM it would imply adding fairly complicated scope policies to multiple IAM instances. Has anyone done this (this = keeping scope policies consistent between IAM instances, possibly involving another service to keep policies in synch)?
As an alternative we would need to have a blanket policy to permit any scope requests from this particular client. Is this a standard workflow?
Thanks for your input!
Beta Was this translation helpful? Give feedback.
All reactions