Uploaded image for project: 'Help-Desk'
  1. Help-Desk
  2. HELP-6964

FIWARE.Request.Tech.Security.AuthorizationPDP.Securing verbs via the PEP proxy

    Details

    • Type: extRequest
    • Status: Closed
    • Priority: Major
    • Resolution: Done
    • Fix Version/s: 2021
    • Component/s: FIWARE-TECH-HELP
    • Labels:
      None
    • HD-Chapter:
      Security
    • HD-Enabler:
      AuthZForce

      Description

      Hello,

      We would like to secure out ContextBroker so POSTS are allowed, but a
      DELETE isn't. We've asked you about this and you've said we should do the
      following:

      We've tried this, but we've had the following problems:

      In your previous mail, it is stated that we need AuthZForce. However,
      Keypass seems to do something similar. Can you explain the difference?

      Can you help us with this?

        Activity

        Hide
        aalonsog Alvaro Alonso added a comment -

        Policies are created in AuthZForce when you assign a permission to a role and click in the button "Save". Are you doing this? It seems you are only creating the permission.

        Show
        aalonsog Alvaro Alonso added a comment - Policies are created in AuthZForce when you assign a permission to a role and click in the button "Save". Are you doing this? It seems you are only creating the permission.
        Hide
        fw.ext.user FW External User added a comment - - edited

        I linked a permission to a role and clicked on save to generate the
        rule/policy but do not see what you describe in my logs (these are the logs
        we previously sent up).
        I do see:
        ACCESS_CONTROL_MAGIC_KEY setting is not set.
        WARNING:idm_logger:ACCESS_CONTROL_MAGIC_KEY setting is not set.

        Met vriendelijke groet/Kind regards

        Show
        fw.ext.user FW External User added a comment - - edited I linked a permission to a role and clicked on save to generate the rule/policy but do not see what you describe in my logs (these are the logs we previously sent up). I do see: ACCESS_CONTROL_MAGIC_KEY setting is not set. WARNING:idm_logger:ACCESS_CONTROL_MAGIC_KEY setting is not set. Met vriendelijke groet/Kind regards
        Hide
        fw.ext.user FW External User added a comment - - edited

        Just to be sure:
        Do we need to configure a Wilma PEP proxy and specify the Authorization PDP
        GE URL in the config file? We are only configuring IDM with the AuthZForce
        service.
        Because we don't specific a our AuthZForce domain maybe the system doesn't
        know where to write the policy? I saw that we do have to define this in the
        PEP config file if we were to use this in combination with IDM and the
        AuthZForce service.

        Met vriendelijke groet/Kind regards,

        Show
        fw.ext.user FW External User added a comment - - edited Just to be sure: Do we need to configure a Wilma PEP proxy and specify the Authorization PDP GE URL in the config file? We are only configuring IDM with the AuthZForce service. Because we don't specific a our AuthZForce domain maybe the system doesn't know where to write the policy? I saw that we do have to define this in the PEP config file if we were to use this in combination with IDM and the AuthZForce service. Met vriendelijke groet/Kind regards,
        Hide
        aalonsog Alvaro Alonso added a comment -

        Hi,

        you have to use your own AuthZForce instance an set its address in Horizon configuration. PEP Proxy is not necessary.

        Show
        aalonsog Alvaro Alonso added a comment - Hi, you have to use your own AuthZForce instance an set its address in Horizon configuration. PEP Proxy is not necessary.
        Hide
        fw.ext.user FW External User added a comment - - edited

        Hello Help-Desk/Alvaro Alonso,

        Thank you for your reply and possibile fixes. Unfortunately it still does not work yet.
        To move forward on the security, we have decided to change our software-architecture.
        In this new architecture we do not need to secure the Contextbroker anymore since it will listen to our local API only.
        I would like to thank you al for the support on this issue. From our perspective, you may close this issue.

        Show
        fw.ext.user FW External User added a comment - - edited Hello Help-Desk/Alvaro Alonso, Thank you for your reply and possibile fixes. Unfortunately it still does not work yet. To move forward on the security, we have decided to change our software-architecture. In this new architecture we do not need to secure the Contextbroker anymore since it will listen to our local API only. I would like to thank you al for the support on this issue. From our perspective, you may close this issue.

          People

          • Assignee:
            aalonsog Alvaro Alonso
            Reporter:
            fw.ext.user FW External User
          • Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

            Dates

            • Created:
              Updated:
              Resolved: