[Fiware-tech-help] [FIWARE-JIRA] (HELP-6895) FIWARE.Request.Tech.Security.PEP-Proxy.Question about prevention of certain calls to Orion Context Broker using HTTP Verb and Resource in Idm

Fernando Lopez (JIRA) jira-help-desk at jira.fiware.org
Tue Sep 24 09:55:00 CEST 2019


     [ https://jira.fiware.org/browse/HELP-6895?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Fernando Lopez updated HELP-6895:
---------------------------------
    Description: 
Dear Sirs,

*We have the current architecture:*

   - Own Keyrock instance (server 1) - Ubuntu
   - Orion ContextBroker service (running on server 2) - CentOS
   - PEP Proxy that redirects to our own API (server 2) - CentOS

It is currently possible to make HTTP calls such as DELETE attribute/entity
directly to the Context Broker using any API testing tool, such as Postman.
We want to prohibit this.

We have some trouble understanding how to go about this.

*This is what we think needs to be done:*

   1. Create a PEP Proxy for ContextBroker app in Idm
   2. Configure a PEP Proxy on server 2 (and run next to the current PEP
   Proxy that we already have)
   3. Create a new role and permission (HTTP verb and resource URL) in the
   PEP Proxy for ContextBroker
   4. Link the two (this is by default not possible, however, the
   individual role and permission are created in the Keystone database)
   5. Assign the role to a user (or perhaps an organization?)
   6. Install and configure a AuthZForce server which deals with the
   configured permissions in Idm and transforms them to XACML

We would like to know if this is the correct way to achieve prohibiting
certain calls to the Context Broker.

*Our questions are:*

   - How can we run a second PEP Proxy next to our already existing PEP
   Proxy on the same server? PEP Proxy 1 is configured in config.js and PEP
   Proxy 2 (for the Context Broker) is configured in config_context_broker.js
   (see config file attached to this e-mail)
   - Does Idm already have a default AuthZForce server, if so, how can we
   activate it?
   - Why can't we link a role to a permission in the user interface
   (perhaps this is because the AuthZForce server is not yet implemented?)
   - How can we configure the PEP Proxy for ContextBroker to work with
   AuthZForce?
   - How can we configure AuthZForce?
   - How can we prohibit certain calls for non-FIWARE users (random people
   that make the calls)?, are the rules only applicable to FIWARE users?

Hopefully you guys can shed some light on the situation or forward this
e-mail to the relevant contact person responsible for PEP Proxy, Orion
Context Broker or AuthZForce. We hope you will get back to us asap. Thanks
in advance. I also attached an example of a call that can be made to our
Context Broker to change data.


  was:
Dear Sirs,

*We have the current architecture:*

   - Own Keyrock instance (server 1) - Ubuntu
   - Orion ContextBroker service (running on server 2) - CentOS
   - PEP Proxy that redirects to our own API (server 2) - CentOS

It is currently possible to make HTTP calls such as DELETE attribute/entity
directly to the Context Broker using any API testing tool, such as Postman.
We want to prohibit this.

We have some trouble understanding how to go about this.

*This is what we think needs to be done:*

   1. Create a PEP Proxy for ContextBroker app in Idm
   2. Configure a PEP Proxy on server 2 (and run next to the current PEP
   Proxy that we already have)
   3. Create a new role and permission (HTTP verb and resource URL) in the
   PEP Proxy for ContextBroker
   4. Link the two (this is by default not possible, however, the
   individual role and permission are created in the Keystone database)
   5. Assign the role to a user (or perhaps an organization?)
   6. Install and configure a AuthZForce server which deals with the
   configured permissions in Idm and transforms them to XACML

We would like to know if this is the correct way to achieve prohibiting
certain calls to the Context Broker.

*Our questions are:*

   - How can we run a second PEP Proxy next to our already existing PEP
   Proxy on the same server? PEP Proxy 1 is configured in config.js and PEP
   Proxy 2 (for the Context Broker) is configured in config_context_broker.js
   (see config file attached to this e-mail)
   - Does Idm already have a default AuthZForce server, if so, how can we
   activate it?
   - Why can't we link a role to a permission in the user interface
   (perhaps this is because the AuthZForce server is not yet implemented?)
   - How can we configure the PEP Proxy for ContextBroker to work with
   AuthZForce?
   - How can we configure AuthZForce?
   - How can we prohibit certain calls for non-FIWARE users (random people
   that make the calls)?, are the rules only applicable to FIWARE users?

Hopefully you guys can shed some light on the situation or forward this
e-mail to the relevant contact person responsible for PEP Proxy, Orion
Context Broker or AuthZForce. We hope you will get back to us asap. Thanks
in advance. I also attached an example of a call that can be made to our
Context Broker to change data.

Met vriendelijke groet/Kind regards,

*Kirstie Patenaude*
Mobile Software Engineer

Lageweg 2
3703 CA Zeist
■ *Mob:* +31(0)6 51 13 56 18
■ *Tel. receptie:* +31(0)30 699 70 20
■ *Mail:* k.patenaude at itude.com

www.itude.com ■ K.v.K. 30146090

Since January 1st, old domains won't be supported and messages sent to any domain different to @lists.fiware.org will be lost.
Please, send your messages using the new domain (Fiware-tech-help at lists.fiware.org) instead of the old one.
_______________________________________________
Fiware-tech-help mailing list
Fiware-tech-help at lists.fiware.org
https://lists.fiware.org/listinfo/fiware-tech-help
[Created via e-mail received from: Kirstie Patenaude <k.patenaude at itude.com>]


> FIWARE.Request.Tech.Security.PEP-Proxy.Question about prevention of certain calls to Orion Context Broker using HTTP Verb and Resource in Idm
> ---------------------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: HELP-6895
>                 URL: https://jira.fiware.org/browse/HELP-6895
>             Project: Help-Desk
>          Issue Type: extRequest
>          Components: FIWARE-TECH-HELP
>            Reporter: FW External User
>            Assignee: Alvaro Alonso
>         Attachments: Append_call_example.rtf, contextBroker_Pep_config.rtf
>
>
> Dear Sirs,
> *We have the current architecture:*
>    - Own Keyrock instance (server 1) - Ubuntu
>    - Orion ContextBroker service (running on server 2) - CentOS
>    - PEP Proxy that redirects to our own API (server 2) - CentOS
> It is currently possible to make HTTP calls such as DELETE attribute/entity
> directly to the Context Broker using any API testing tool, such as Postman.
> We want to prohibit this.
> We have some trouble understanding how to go about this.
> *This is what we think needs to be done:*
>    1. Create a PEP Proxy for ContextBroker app in Idm
>    2. Configure a PEP Proxy on server 2 (and run next to the current PEP
>    Proxy that we already have)
>    3. Create a new role and permission (HTTP verb and resource URL) in the
>    PEP Proxy for ContextBroker
>    4. Link the two (this is by default not possible, however, the
>    individual role and permission are created in the Keystone database)
>    5. Assign the role to a user (or perhaps an organization?)
>    6. Install and configure a AuthZForce server which deals with the
>    configured permissions in Idm and transforms them to XACML
> We would like to know if this is the correct way to achieve prohibiting
> certain calls to the Context Broker.
> *Our questions are:*
>    - How can we run a second PEP Proxy next to our already existing PEP
>    Proxy on the same server? PEP Proxy 1 is configured in config.js and PEP
>    Proxy 2 (for the Context Broker) is configured in config_context_broker.js
>    (see config file attached to this e-mail)
>    - Does Idm already have a default AuthZForce server, if so, how can we
>    activate it?
>    - Why can't we link a role to a permission in the user interface
>    (perhaps this is because the AuthZForce server is not yet implemented?)
>    - How can we configure the PEP Proxy for ContextBroker to work with
>    AuthZForce?
>    - How can we configure AuthZForce?
>    - How can we prohibit certain calls for non-FIWARE users (random people
>    that make the calls)?, are the rules only applicable to FIWARE users?
> Hopefully you guys can shed some light on the situation or forward this
> e-mail to the relevant contact person responsible for PEP Proxy, Orion
> Context Broker or AuthZForce. We hope you will get back to us asap. Thanks
> in advance. I also attached an example of a call that can be made to our
> Context Broker to change data.



--
This message was sent by Atlassian JIRA
(v6.4.1#64016)


More information about the Fiware-tech-help mailing list

You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy   Cookies policy