-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IP-based AuthN/AuthZ: modeling vs. application engineering concern, and use cases #71
Comments
The "do you want to change millions of resources to allow new network client to access them" use case was one of my concerns when thinking about going on a per-resource restriction semantic based modelling approach, as also the semantic itself of the restriction since it could add a different knowledge layer to a probably and well defined concrete RDF type for the resource itself, which could better belong to a different, more appropriate RDF resource type, like an Agent or group. |
From comments on #70: @jcoyne 💬 :
@tdonohue 💬 :
|
I agree that mapping IP addresses to groups is the generally recommended/practiced approach... which likely takes this conversation out of the PCDM domain. Is there an additional outcome we would like to get from this issue, such as your mentioned use cases... or since this practice is commonly in place, maybe some links to documentation for how folks in the community implement this pattern? |
@awoods true, it's out of the PCDM domain. Where do you think this would fit better? Still an semantic issue and maybe there is space here to contribute with use cases that involve other ontologies and modelling that still include and affect PCDM. Like an integration guide/examples. Not sure |
It strikes me as an implementation pattern for setting up your webserver to map I.P. addresses to groups. It is less clear to me where, if anywhere, that intersects with ontologies. |
I'm in agreement about it being outside of the PCDM domain and ontologies after the discussion. I do think there's probably value about there being an implementation pattern guide somewhere (perhaps for Fedora?) as @DiegoPino suggests. I'm going to close this issue but happy to discuss this further. |
JIRA ticket created: https://jira.duraspace.org/browse/FCREPO-2381 |
See comments on #70. In work on the Hydra in a Box models we've recognized the need for providing IP-based auth for objects managed by a Hyku application, Throughout some of this deliberation (see, for example hybox/models#16 and hybox/models#52) we have not been able to determine whether this should be a modeling concern or an application engineering concern.
Some of the discussion on #70, e.g. raised by @DiegoPino notes that "[this] could be more an application or implementation concern/or even AuthZ via WebAC than something you would like to keep with your RDF properties [...]." Some of the ambiguities for me are the question about where in the stack these IP-based restrictions are implemented, and in that case, there probably need some demonstrated use cases to support those implementation decisions.
Caveat: I realize may not necessarily be a PCDM concern, nor specifically even a Fedora/LDP concern. It does seem to touch on our models and implementation around LDP and WebAccessControl. In any case some assistance in how to sharing/framing a set of questions with the W3C's ReadWriteWeb CG would be useful, because I'm still struggling with the uncertain status of WebAccessControl and the supporting BasicAccessControl Ontology as a "standard" given the existence of widely differing implementations and extensions. If it makes sense to have a broader conversation within "our" communities beyond PCDM (e.g. roping in more FCREPO, Hydra, or Islandora folks otherwise not represented directly), I would welcome that.
The text was updated successfully, but these errors were encountered: