Project Name:
- Proposed name for the project: Application Authorization Framework
- Proposed name for the repository:
AAF
Project description:
The goal of the project is to provide consistent authentication, authorization and security to various ONAP components. AAF organizes software authorizations so that applications, tools and services can match the access needed to perform job functions. AAF is designed to cover Fine-Grained Authorization, meaning that the Authorizations provided are able to use an Application's detailed authorizations, such as whether a user may be on a particular page, or has access to a particular Pub-Sub topic controlled within the App. This is a critical function for Cloud environments, as Services need to be able to be installed and running in a very short time, and should not be encumbered with local configurations of Users, Permissions and Passwords. The sister framework CADI ( Code Access Data Identity ) allows Java Applications to utilize Identity Authentication methods as plugins. Certificate Manager delivers X.509 certificates in support of 2 way x509 TLS.
Scope:
The scope of the AAF project is a pluggable and extensible framework that
- Organizes software authorizations so that applications, tools and services can match the access needed to perform job functions
- Provides Enterprise Level Authentication and Authorization
- Provides Role based authorization, including attribute-based authorization elements
- The frameworks exposure layer should be consumable by any product or technology
- The frameworks should be highly available with a resilient data store
- Provides administration functions by GUI and management APIs
- Provides consistent client plugins to access authentication and authorization frameworks functions
- Provides support for multi-tenancy
- Provides support for SSL Certificate management
- Provides support for OAuth2
- Support Microservices ( Docker/Kubernetes )
- Provide hardware security plugin for storing private keys and for performing cryptography operations that require private keys
- Management of Secrets and Protection of Secrets
CADI ( Code Access Data Identity) - Addresses the Runtime Elements of Access and Identity.
- Secure code by Reuse
Defend Access with Authentication and Authorization
Protect Data by ensuring TLS encryption over the wire
Ensure Apps protect resources for each Identity
- CADI can handle multiple Authentication Protocols in the same service
- Client Side Caching for Speed and less network access
Certificate Manager :
- Creates certificates.
- Eliminates Expiration Risk with Auto-Renewal
Entities within AAF
Namespaces
A Namespace, in AAF, is the ensemble of Roles, Permissions and Identities. Namespaces are known by domain, example com.onap.dcae or com.onap.appc and they are hierarchically managed.
A Namespace is assigned to an application. A namespace contains one or more roles and one or more permissions. By default, every namespace has an admin role
People in Namespaces
Tasks that the Owner (Responsible) must perform:
- Owners receive by email a notification to Approve.
- Owners also receive notifications of time based activities
- Periodic Revalidation of Users in Roles in Namespace
- Periodic Revalidation of Permission in Namespace to Roles
Admin
Admins may
- Create/Delete/Modify Roles in Namespace
- Add/Remove Users from Roles in Namespace
- Create/Delete/Modify Permissions in Namespace
- Grant/Ungrant (i.e. Revoke) Permissions in Namespace to any Role in the company (Cross Company Role Grants are possible, but require approvals from both sides).
Object Model
In AAF, permissions are granted to roles. Roles are assigned to User. A user can be assigned to any number of roles. Roles and permissions are stored centrally but segregated by Application.
For authorization, all that matters is the permissions you are granted.
AAF is an Attribute Based Access Control System. Permission is the embodiment of the Attribute. It is broken up into three elements.
- Type -
This is the core name of the Permission, and describes its kind. The type is "meta-data" which is a reference to the kind of Resource that is to be protected
- Instance - The object of the interaction. E.g. Database Table.
- Action - What is happening to that object. E.g. read, write, delete, etc.
Interacting with AAF
AAF GUI
The AAF GUI is designed primarily to provide AAF-specific information to users, though it does contain a few management features.
What AAF-specific information can you see in the GUI?
You can see the roles to which you are assigned, the permissions which you have been granted and the Namespaces in which you are an admin or responsible party
What management features are in the GUI?
- My Approvals
- If you are responsible for any namespaces or other resources, this is where you will need to approve or deny requests about those resources.
- Password Management
- This page provides the ability to reset passwords.
- Permission Granting
- If you are an admin or responsible person for a Namespace, you will find a "Grant This Perm" link for each permission in your Namespace details page. You can grant your permission to a role from this page. You can also expose this link to others if you want them to request access to your permission
AAF CUI (Command User Interface)
The CUI provides more management and reporting features to users through a command prompt interface.
Application Authorization Framework Big Picture
Architecture Alignment:
How does this project fit into the rest of the ONAP Architecture?
AAF is used for fined grained authorization of an application. It can authorize DMaaP for pub/sub to a topic. It can authorize access to services registered in Microservices Bus.
- What other ONAP projects does this project depend on?
- Does not depend on any ONAP project.
- How does this align with external standards/specifications?
- X.509 Certificates
- Are there dependencies with other open source projects?
Cassandra
- DME ( Direct Messaging Engine, developed by "AT&T Common platform" Team )
Resources:
- Primary Contact Person - Ram Koya(ATT), John Murray(ATT)
- Names, gerrit IDs, and company affiliations of the committers
- Names and affiliations of any other contributors
- Project Roles (include RACI chart, if applicable)
Name | Gerrit ID | Company | Time Zone | |
---|---|---|---|---|
Ram Koya | AT&T | Dallas, USA CST/CDT | ||
John Murray | AT&T | Bedminster, USA EST/EDT | ||
Dominic Lunanuova | AT&T | MiddleTown, USA EST/EDT | ||
Sitharaman T R | IBM | tsithara@in.ibm.com | Middletown,USA EST/EDT |
Other Information:
- link to seed code: https://github.com/att/AAF
- Vendor Neutral
- The current seed code has been already scanned (using Fossology and Blackduck) and cleaned up to remove all proprietary trademarks, logos.
- Subsequent modification to the existing seed code should continue to follow the same scanning and clean-up principles
- Meets Board policy (including IPR)
Key Project Facts
Project Name:
- JIRA project name: Application Authorization Framework
- JIRA project prefix: AAF-
Repo name: org.onap.aaf
Lifecycle State: incubation
Primary Contact: Ram Koya
Project Lead: Ram Koya
mailing list tag [Should match Jira Project Prefix]
Committers:
Ram Koya rk541m@att.com
Jonathan Gathman jg1555@att.com
Contributors:
Varun Gudisena vg411h@att.com
Sai Gandham sg481n@att.com
Sowjanya Vemulapally sv8675@att.com
Sitharaman T R tsithara@in.ibm.com
Catherine Lefèvre cl664y@intl.att.com
*Link to TSC approval:
Link to approval of additional submitters:
17 Comments
HuabingZhao
Currently, users have to sign on every subsystem seperately such as SDC, A&AI, SO etc. Will this project consider providing sso(single sign on) for ONAP?
Ramprasad Koya
Yes, The scope includes providing SSO capability to all ONAP Systems.
Sandeep Shah
is it correct to assume that this project entails distributed RBAC across ONAP components but RBAC policies managed centrally? Meaning - a user, deployment/ops rep can access ONAP components (that he is authorized to access) and perform actions (that he is authorized to perform)? RBAC policies will not be maintained per ONAP component instance, but in a logically central location? Would this be correct? Would appreciate clarification. Thank you.
Varun Gudisena
AAF is more than a typical RBAC. There are Roles, to be sure, but the important Architectural Pattern includes separation of Roles and Permissions. The permissions, having a 3 part definition, make AAF also like an ABAC (A=Attribute).
Roles, Permissions are stored centrally, but segregated by Application (the proverbial Namespace). The Application Creates Permissions that match their code (for the question "Does User have Permission"). Permissions are granted to Roles, to which the User belongs.
Only Namespace Admins may manage Roles/Permissions within a Namespace. The Granting process is One-Way. The Namespace Admins must Grant given Permissions to Roles on request.
AAF is NOT a Policy Engine, where dynamically based Policies are validated against differing kinds of Data Stores. AAF (Application Authorization Framework) is focused on RealTime Authentication and Authorization.
Varun Gudisena
Please find the answers for queries on Initial Project Proposal Feedback From the TSC.
Could the project proposal clarify how to enforce the auth of asyn message publishing/subscription and the sync REST requests separately?
AAF usage within Sync/Async messaging, typically, an Application will use the CADI Framework (Think of this as AAF Client Library) to Authenticate and Authorize each and every incoming HTTP call. Caching is employed to avoid too many AAF Service Hits.
Using AAF will force every interaction between Application/Components to be Authenticated and Authorized.
Users, like Apps, need to be Authenticated and Authorized for each transaction as well. From an Application perspective, there is no real difference between the need to Authenticate and Authorize any given activity.
is there any internal or external dependencies for this project?
No
Michael Behan
Some points for consideration:
These and other points are captured well in the NIST's Computer Security Division's analysis on ABAC: http://csrc.nist.gov/projects/abac/index.html
HuabingZhao
I understand that authentication and authorization are centralized enforced by AAF, and every microservice needs to use CADI to talk with AAF to accomplish that like the below diagram, is it correct?
This approach is feasible but has some limitations, such as
Every microservice need to handle the authentication and authorization, although it was done by CADI framework.
Requires every microservice to use CADI framework.
Need to develop new CADI frameworks for other languages like python.
The change of AAF and CADI will impact every ONAP components, which means the upgrade of AAF/CADI will cause every microservice to recompile and redploy.
Make is hard to replace the auth service to other implementation, which may be needed if community user wants to integrate ONAP with their own system.
A more flexible solution is to use the API Gateway as the entrypoint for centralized Authentication and Authorization, which can avoid all the above issues.
This approach can reuse whatever AAF project already have and move the auth responsibility from all the microservices to api Gateway.
maopeng zhang
Is the AAF a micro service? How could the other project consume the AAF? How could it effect the other projects, not written in java?
I think it needs to be more clear, thanks
Jonathan Gathman
AAF is a MicroService in the true sense of the word, such as limited scope, etc. It was designed so before the term was popular.
AAF itself (the Service) is a RESTful service, accessible by any technology able to utilize HTTP/S. For Java, we have the CADI Framework, which supports multiple Authentication Protocols (BasicAuth, 2-way Certs, etc). This framework in Java also provides Caching, etc, and clear use for J2EE security.
If other non-Java technologies are needed, the principals of CADI could be applied, such as Caching (or Token use), appropriate retry/scalability/resiliency models, etc.
Andrew Baxter
The project describes itself as a pluggable and extensible framework. How do you plug a different Authentication and Authorisation provider into this framework/ONAP?
Many Thanks!
maopeng zhang
No, I do not plug a different one.
Is the CADI used for the AAF to integrate with other projects?
what's the API specification of CADI? Can it be invoked by python, or only by java?
Thanks
Jonathan Gathman
The CADI Framework is a pluggable Framework, (AAF is the Authorization Service, and “pluggable” does not apply to AAF as a Service/MicroService).
This enables services to serve different Authentication/Authorization needs in Realtime without having to create separate Services for each combination.
Andrew Baxter
Hi Jonathan,
Thanks for this - sounds promising - can you point me at more details?
Hu To
HI,
Is AAF mandatory in the Beijing version? Can we discard AAF if we want a lightweight deployment environment?
Jonathan Gathman
AAF is used for Authentication and Authorization. What you are really saying is that you would want a system without Authentication or Authorization, in other words, no security at all. While you could do that to play with, there is no way we could recommend that for any serious installation.
Casablanca includes more integration than Beijing.
Srinivasa Addepalli
Hi Jonathan,
Is it possible to run other services without AAF? I thought services connect to AAF for RBAC decisions. Is there any way to inform services not to call AAF?
Thanks
Srini
MANOJ731153 JENA
Hi,
Is AAF supporting multi-tenancy for Honolulu release ? if yes then is there any use case (How to test whether its supporting multi-tenancy or not) for the same .
Regards,
Manoj