Difference between revisions of "Fusion Security Manager (FR V11)"
(→Security Admin) |
(→Datapoint Read Rules) |
||
Line 90: | Line 90: | ||
== Datapoint Read Rules == | == Datapoint Read Rules == | ||
− | + | [[File:Datapoint Read Rule.png|thumb|Datapoint Read Rule denying access to OBS_CONF=C]] | |
+ | |||
+ | These security rules enable parts of a Dataset to be restricted based on the reported Dimension or Attribute values. When the rule is applied it acts like a filter on Series and Observations within a Dataset. This makes it possible to grant access to the Dataset but to have different filters on the data for different users. | ||
+ | |||
+ | The Datapoint Read Rule requires the Component ID (this refers to either the Attribute ID or Dimension ID) and the Component Value (the reported value to Deny or Allow access to). An example of a restriction is: Component ID=OBS_CONF, Component Value=C. This rule would match any Series or Observation which is reporting OBS_CONF="C". Other optional values on this rule are the Dataflow Agency, Id, and Version which this rule is applicable for. If the rule is applicable for all Dataflows, these values do not need to be reported. The Agency, Id, and Version act as a filter on Dataflows, for example it is possible to just fill in the Agency ID, which would ensure the rule was only applicable for data reported against Dataflows whose Agency matches the value defined in the rule. | ||
+ | |||
+ | The behaviour of the rule is as follows: | ||
+ | * If the rule matches on a Series Attribute or Dimension - the rule is applicable to all observations in the series. For example, if the rule is a Deny rule, the user will not be able to see the Series or any of its Observations. | ||
+ | * If the rule matches on an Observation Attribute - the rule is applicable to the single observations. For example, if the rule is a Deny rule, the user will not be able to see the Observation in the Series. | ||
+ | * If the Attribute has no value in the Series or Observation (i.e. it is an optional Attribute) - the rule will not apply and the user '''will''' be able to see the Series or Observation to which the attribute relates | ||
== Data Attribute Read Rules == | == Data Attribute Read Rules == | ||
TODO | TODO |
Revision as of 03:08, 8 February 2023
Contents
Overview
The Security model in Fusion Registry 11 was enhanced to reflect the need to support more complex use cases around securing information in the Registry.
Authorization permissions are now maintained in a separate web User Interface called Fusion Security Manager. This User Interface enables the creations of Groups, and the creation of authorization rules which explicitly permit or deny a security group access to a resource.
The default behaviour of Fusion Registry 11 is to make everything private. In order to make structures and data public, specific security rules must be defined to grant access.
The following topics discuss each aspect of security in Fusion Registry 11.
Security Groups
The Fusion Security Manager enables Groups to be defined. Fusion Registry no longer supports assigning users to Groups, instead it will get the Group information from the Authentication service, for example Active Directory supports assigning Groups to users, and the Fusion Registry will map any Group that the AD User belongs to, with it's own Groups. In short, if the AD Group ID matches a Group ID in the Fusion Security Manager, then the Fusion Registry user assumes that Group. The user can be long to one or more Groups.
By default there is a Group called 'Public'. This Group can not be deleted, and all users belong to the Public Group, even if they are not logged into the system. The Public Group provides a mechanism for granting unrestricted access to resources.
When security rules are defined, they either grant an Allow permission, or a Deny permission. It is important to note that a Deny permission implicitly allows all other Groups. When rules are checked against a specific user, the user will be granted access if they belong to at least one Group that has permission
The following table describes this behaviour with specific examples:
User Group(s) | Security Rule(s) | Outcome |
---|---|---|
Public | - none defined - | The user can not see the resource as the default behaviour is to deny access |
Public | Allow Public | The user can see the resource |
Public, G1 | Deny Public | The user can see the resource. Deny Public implicitly allows all other Groups, the user belongs to Group G1 which grants them access |
Public, G1 | Deny G1 | The user can see the resource. Deny G1 implicitly allows all other Groups, the user belongs to Group Public which grants them access |
Public, G1 | Allow G1 | The user can see the resource as they belong to one of the Groups that has been given permission to the resource |
Public | Allow G1 | The user can not see the resource as they do not belong to the Group which is allowed to see the resource |
Public, G1 | Allow G1, Deny Public | The can see the resource as belong to the Group G1 which is allowed to see the resource |
Security Admin
The Security Admin page of Fusion Security Manager enables a user to be granted specific permissions for administering parts of the Fusion Registry.
The Admin functions are as follows:
Admin Function | Access Rights |
---|---|
Audit Manager | Ability to query for audit and log information via the Audit web service |
Data Manager | Unrestricted access to view, publish, and delete data |
Error Subscriber | Ability to view, add, and delete subscriptions to error conditions |
Kafka Manager | Ability to view, add. and remove Kafka connections |
Portal Manager | Ability to use Fusion Portal for automating the synchronization of datasets from external web services |
Reference Metadata Admin | Unrestricted access to view, add, and delete SDMX Reference Metadata |
Server Admin | Unrestricted access to server administration functions |
Structure Admin | Unrestricted access to view, add, and delete SDMX Structural Metadata. Ability to add, delete, and run Environment Synchronisation Ability to view structure transaction details, and to roll back to a transaction |
User Admin | Ability to perform all functions in the Fusion Security Manager |
Structure Security
Read Rules
TODO
Write Rules
TODO
Reference Metadata Security
Read Rules
TODO
Write Rules
TODO
Data Security
Dataset Read Rules
TODO
Dataset Write Rules
TODO
Datapoint Read Rules
These security rules enable parts of a Dataset to be restricted based on the reported Dimension or Attribute values. When the rule is applied it acts like a filter on Series and Observations within a Dataset. This makes it possible to grant access to the Dataset but to have different filters on the data for different users.
The Datapoint Read Rule requires the Component ID (this refers to either the Attribute ID or Dimension ID) and the Component Value (the reported value to Deny or Allow access to). An example of a restriction is: Component ID=OBS_CONF, Component Value=C. This rule would match any Series or Observation which is reporting OBS_CONF="C". Other optional values on this rule are the Dataflow Agency, Id, and Version which this rule is applicable for. If the rule is applicable for all Dataflows, these values do not need to be reported. The Agency, Id, and Version act as a filter on Dataflows, for example it is possible to just fill in the Agency ID, which would ensure the rule was only applicable for data reported against Dataflows whose Agency matches the value defined in the rule.
The behaviour of the rule is as follows:
- If the rule matches on a Series Attribute or Dimension - the rule is applicable to all observations in the series. For example, if the rule is a Deny rule, the user will not be able to see the Series or any of its Observations.
- If the rule matches on an Observation Attribute - the rule is applicable to the single observations. For example, if the rule is a Deny rule, the user will not be able to see the Observation in the Series.
- If the Attribute has no value in the Series or Observation (i.e. it is an optional Attribute) - the rule will not apply and the user will be able to see the Series or Observation to which the attribute relates
Data Attribute Read Rules
TODO