grouper-users - [grouper-users] RE: Non-wheel privileges for attestation access
Subject: Grouper Users - Open Discussion List
List archive
- From: "Hyzer, Chris" <>
- To: "Redman, Chad" <>, "" <>
- Subject: [grouper-users] RE: Non-wheel privileges for attestation access
- Date: Wed, 9 Aug 2017 15:21:48 +0000
- Accept-language: en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23: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
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
Im working on a patch for this that will be available shortly. The thought is that any user can use attestation regardless of the attribute security, if the user can READ/UPDATE or ADMIN a group. The UI will
be a façade around the attribute security and just make that happen. Does that sound reasonable / acceptable or do you want the attribute security too? My thought is that it is burdensome in this case and not a requirement. Thanks Chris From: [mailto:]
On Behalf Of Redman, Chad The users were waiting on a fix for this, so I debugged the source code to figure out exactly what was needed for a regular user to view the attestation or mark it as Reviewed. To view the attestation page: 1)
User needs to have Read on etc:attribute:attestation:attestationDef 2)
User needs to have Read on etc:attribute:attestation:attestationValueDef 3)
User needs both Read and Attribute Read on the group in question Note that the button to mark it as reviewed shows up for these users, even though they don't have the update privilege that would make it work. They just get a user-unfriendly message about no access to the attribute
definition. Checking for the correct permissions before showing the button would be helpful here. To be able to mark the group as Reviewed: 1)
User needs to have Read and Update on etc:attribute:attestation:attestationDef 2)
User needs to have Read and Update on etc:attribute:attestation:attestationValueDef 3)
User needs Read on the group in question (Update isn't necessary unless you want them to edit the membership) 4)
User needs both Attribute Read and Attribute Update on the group in question To simplify configuration slightly, we created a Readers group and an Updaters group, instead of granting individual permissions to the attribute definitions in etc:attribute. Any users who would be doing any
kind of attestation work would be put into one of these groups. It's possible that it's safe to make access to the attribute definitions public, as you can only read or edit groups where you have attribute read/update anyway. We were just playing it safe there
for now. -Chad From: []
On Behalf Of Redman, Chad
We just had our first user get an attestation recertification email, and when they tried to certify, they reported back an error: "etc:attribute:attestation:attestation attribute doesn't exist". The user actually wasn't an admin for the group, but got the email because the address was explicitly set in the Email addresses field. However, in my testing using a non-wheel account, being an admin for the group is not enough. When I
gave my non-wheel user admin privileges, I could reproduce the same error. The only way I could get attestation to work was to grant the user read/update on etc:attribute:attestation:attestationDef and etc:attribute:attestation:attestationValueDef. But this
is not desirable, as it now allows the user to edit attestation for any group. Am I looking at this the wrong way? Thanks! -Chad |
- [grouper-users] RE: Non-wheel privileges for attestation access, Redman, Chad, 08/02/2017
- [grouper-users] RE: Non-wheel privileges for attestation access, Hyzer, Chris, 08/09/2017
- [grouper-users] RE: Non-wheel privileges for attestation access, Redman, Chad, 08/10/2017
- [grouper-users] RE: Non-wheel privileges for attestation access, Hyzer, Chris, 08/10/2017
- [grouper-users] RE: Non-wheel privileges for attestation access, Redman, Chad, 08/10/2017
- [grouper-users] RE: Non-wheel privileges for attestation access, Hyzer, Chris, 08/09/2017
Archive powered by MHonArc 2.6.19.