Difference between revisions of "Fusion Security Manager (FR V11)"

From Fusion Registry Wiki
Jump to navigation Jump to search
(Security Admin)
(Security Admin)
Line 66: Line 66:
 
| User Admin ||  Ability to perform all functions in the Fusion Security Manager
 
| User Admin ||  Ability to perform all functions in the Fusion Security Manager
 
|}
 
|}
 +
 +
= Structure Security =
 +
== Read Rules ==
 +
TODO
 +
 +
== Write Rules ==
 +
TODO
 +
 +
= Reference Metadata Security =
 +
 +
== Read Rules ==
 +
TODO
 +
 +
== Write Rules ==
 +
TODO
 +
 +
= Data Security =
 +
== Dataset Read Rules ==
 +
TODO
 +
 +
== Dataset Write Rules ==
 +
TODO
 +
 +
== Datapoint Read Rules ==
 +
TODO
 +
 +
== Data Attribute Read Rules ==
 +
TODO

Revision as of 02:41, 8 February 2023


Overview

The Security model in Fusion Registry 11 was enhanced to reflect the need to support more complex use cases around securing information in the Registry.

Authorization permissions are now maintained in a separate web User Interface called Fusion Security Manager. This User Interface enables the creations of Groups, and the creation of authorization rules which explicitly permit or deny a security group access to a resource.

The default behaviour of Fusion Registry 11 is to make everything private. In order to make structures and data public, specific security rules must be defined to grant access.

The following topics discuss each aspect of security in Fusion Registry 11.

Security Groups

The Fusion Security Manager enables Groups to be defined. Fusion Registry no longer supports assigning users to Groups, instead it will get the Group information from the Authentication service, for example Active Directory supports assigning Groups to users, and the Fusion Registry will map any Group that the AD User belongs to, with it's own Groups. In short, if the AD Group ID matches a Group ID in the Fusion Security Manager, then the Fusion Registry user assumes that Group. The user can be long to one or more Groups.

By default there is a Group called 'Public'. This Group can not be deleted, and all users belong to the Public Group, even if they are not logged into the system. The Public Group provides a mechanism for granting unrestricted access to resources.

When security rules are defined, they either grant an Allow permission, or a Deny permission. It is important to note that a Deny permission implicitly allows all other Groups. When rules are checked against a specific user, the user will be granted access if they belong to at least one Group that has permission


The following table describes this behaviour with specific examples:

User Group(s) Security Rule(s) Outcome
Public - none defined - The user can not see the resource as the default behaviour is to deny access
Public Allow Public The user can see the resource
Public, G1 Deny Public The user can see the resource. Deny Public implicitly allows all other Groups, the user belongs to Group G1 which grants them access
Public, G1 Deny G1 The user can see the resource. Deny G1 implicitly allows all other Groups, the user belongs to Group Public which grants them access
Public, G1 Allow G1 The user can see the resource as they belong to one of the Groups that has been given permission to the resource
Public Allow G1 The user can not see the resource as they do not belong to the Group which is allowed to see the resource
Public, G1 Allow G1, Deny Public The can see the resource as belong to the Group G1 which is allowed to see the resource

Security Admin

The Security Admin page of Fusion Security Manager enables a user to be granted specific permissions for administering parts of the Fusion Registry.

The Admin functions are as follows:

Admin Function Access Rights
Audit Manager Ability to query for audit and log information via the Audit web service
Data Manager Unrestricted access to view, publish, and delete data
Error Subscriber Ability to view, add, and delete subscriptions to error conditions
Kafka Manager Ability to view, add. and remove Kafka connections
Portal Manager Ability to use Fusion Portal for automating the synchronization of datasets from external web services
Reference Metadata Admin Unrestricted access to view, add, and delete SDMX Reference Metadata
Server Admin Unrestricted access to server administration functions
Structure Admin Unrestricted access to view, add, and delete SDMX Structural Metadata.
Ability to add, delete, and run Environment Synchronisation
Ability to view structure transaction details, and to roll back to a transaction
User Admin Ability to perform all functions in the Fusion Security Manager

Structure Security

Read Rules

TODO 

Write Rules

TODO

Reference Metadata Security

Read Rules

TODO 

Write Rules

TODO

Data Security

Dataset Read Rules

TODO 

Dataset Write Rules

TODO

Datapoint Read Rules

TODO

Data Attribute Read Rules

TODO