Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Mike Gettes drew a diagram which the group discussed and the finished image was:
Image Added

Mike Olive and Scotty Logan said that they could contribute the documentation sets they use for workgroup and authority. They use workflow to route work items to appropriate people for their part of a task, making it an integral part of the authorization system.

MIT: Scott Thorne will provide a document describing how MIT designs systems, and why they are designed that way. (Mike re-phrased as: Nearing analysis paralysis on systems architecture and development.)

Paul Hill and Jim Repa will provide a summary of what happened with a recent integration of an application, specifically to show how the triple (person & function & qualifier) modeling breakdown of a recent implementation developed.

Discussion:

Data Out: how to represent permissions

i.e. foo:bar:permission1:p2:p3:...

ex. listmgmnt:listname:function

Do all three of these permission categories / systems / uses require seeing the same structure?

The data changes with the use.

Perms Mapping Authz

Authz System

App checking Authz

(eval vs reference)

APP This That

Permit:foo:function:qualifier

>> Application foo can only see foo:x

C S F Q : Limits

C = Category

S = subject (person, system, application)

F = Function

Q = Qualifier

Limits can be anything, as: Time, date, money, etc.

What we covet / admire / wish for:

  • LDAP & APIs
  • Reflecting Apps roles back into Central Management
  • Stanford's decoupling of roles & systems (layering)
  • Automated de-provisioning of permissions
  • Signet's subject API
  • Reducing the # of PMS

o Build bridges between

  • Good governance policy

What do we question?

  • the MIT triple in terms of comprehensiveness, and of comprehension by Customers
  • can we map out an institutional system of roles?

PSU presented a short discussion on work done by a consultant for them on a Content Management System that has identified five 'branches' or 'categories' of entities:

Curriculum

Roles

Individuals

Buildings

Org Units

Mike G. noted that this appears to be more of a Library Science view than a Computer Science analysis / representation, in that the categories are specific, not abstracted, the organization appears to be list oriented, and there are no indicators for the relationships between the entities.

Mike G. raised the question for all to consider: Does any of this conflict with Internet 2, Educause, MACE (Middleware Architecture Committee for Education), etc.?

  • People could not see any at the time.

We need to agree on the data interfaces:

  • OSID
  • REST
  • WSDL

with the goal of providing a common language that we can all understand, and take the same meaning from.

============================
from atttendee #3
Items of discussion:
1. permissions to the rest of the app world
2. data out - xacml
PSU (Renee) provide touchpoints of policy and SDLC & IdLM applied to PMS (2-3 mths)
UW (Ian) Q&A of what they currently do for PMS & developer engagements
SU (MO) published docs for PMS and groups
MIT (Scott) Analysis Paralysis on systems architecture and development
MIT (Scott) capture systems breakdown into triple model of late

Seems to be consensus around entitlement LDAP attribute structure of Categorty:Subject:Function:Qualifier

RESTful interface
OSID

3. IDE/UI
4. Layering as UI
5. Data classification
6. Business Intelligence
7. Risk Mgmt/App Mgmt
8. OSID / Interfaces

=========================
From attendee #4

Scotty Logan goal for meeting: a common way to represent permissions in a directory

MIT
-seems like the authorization is in the database...
MIT's Roles Database: Parts of an Authorization
web.mit.edu/repa/www/roles_auth_parts.html

Action Items
PSU - touch points of policy and SDLL & IdLM applied to Privilege Management System

UW - share Q&A of what they currently do for PMS & develop discussion

Stanford - does for developers on how to use Auth

MIT - Nearing anlaysis/paralysis on system architecture and development
-Capture systems breakdown into triple model (subject/function/thing)

DATA OUT
Ways in which data can be represented
foo:bar:permission1:p2:p3
list management:list name: function

person managing auth
managing authz system
application checking authz
evaluation vs. reference

category:subject:function:qualifier

date range contained in the directory -
unnecessary, if it is in the directory it is valid

Covet
-the LDAP APIS
-Stanfords developing of roles and systems layering
-automated de-provisioning
-app driven vs. org driven
-subject api

Additional Goals/Action Items:
common interface to the systems: OSID, WSDL, REST
common format for what a role looks like
common format for static representation in LDAP

===================================
Attendee #5

http://itarch.stanford.edu/blog/archives/2008/general/permissions-management-meeting-mitImage Added http://itarch.stanford.edu/blog/archives/2008/general/permissions-management-meeting-mit-discussionImage Added