-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User self-service of uploading DNs #527
Comments
In the near future (summer) we'll rely exclusively on IAM VOMS AA and that means resolution of this issue is getting more important. |
Hi all, we are setting up priorities for VOMS Admin EOL related issues and this one is on our roadmap. Please just remember that right now an IAM admin can upload any certificate (the full one, not only DN and issuer) to any user, so this workaround is already in place. Anyway, to my understanding what is missing compared to VOMS is:
Do you agree with the modifications needed in IAM? |
Hi all, When we allow a user to paste DN + CA strings, we will again open the door to errors, in particular w.r.t. to the format of those strings: classic format with '/' separators vs. modern comma-separated formats (forward or backward)... I therefore do not mind that the actual certificate has to be pasted by users. However, admins could be given the DN + CA option, but then there should either be clear instructions provided next to the input panels, or the code should accept multiple reasonable formats... |
Hi all, Even better would be an option for VO admins to approve such operations... |
May be IAM could validate that user certificate is really "grid personal certificate" (using CaNL & |
Hello,
Other features will be considered later:
Do you see any major problem with this approach? |
Ciao Davide, That is, configure IAM not to offer that functionality? It would allow an admin to:
|
It's surely doable but I'm not sure if it's planned. I ask @giacomini about this. Otherwise you can already disable this functionality by adding a reverse proxy in front of IAM. |
Yes, but I would prefer not with this PR. However:
What kind of sanity check do you have in mind? I think that you can only link a certificate that has been issued by one of the CAs that are trusted by IAM (system ones and IGTF).
My preferred mechanism to make an admin aware of this (and other events) is to use the audit log. Alternatively we could send a mail notification. |
Hi all, Admins cannot be expected to browse the audit log for such events; there has to be an e-mail notification, OK? |
So we should transform the "link certificate" action to a request to be approved, if IAM is so configured. Is that ok?
In an ideal future world I expect that notifications are available in multiple ways based on what appears in the audit log. But in the meantime we can extend our notification mechanism, like we are doing for user suspension/restoration. |
OK & OK, thanks! |
Currently in VOMS-Admin users can upload their own DNs manually. This is often used for robot certificates today as we assume all users already have their certificate in the browser.
IAM cannot do this - certificates can only be linked to the identity if they are taken from the TLS connection. This makes it difficult to upload a robot certificate for a user (assuming that users aren't invoking REST APIs).
Additionally, as we transition to tokens, I don't think it's safe to assume users will still have certificates in their browsers... meaning this will become an important issue.
The text was updated successfully, but these errors were encountered: