Skip to Content.
Sympa Menu

grouper-users - [grouper-users] RE: Non-wheel privileges for attestation access

Subject: Grouper Users - Open Discussion List

List archive

[grouper-users] RE: Non-wheel privileges for attestation access


Chronological Thread 
  • From: "Hyzer, Chris" <>
  • To: "Redman, Chad" <>, "" <>
  • Subject: [grouper-users] RE: Non-wheel privileges for attestation access
  • Date: Wed, 9 Aug 2017 15:21:48 +0000
  • Accept-language: en-US
  • Authentication-results: spf=none (sender IP is ) ;
  • Ironport-phdr: 9a23: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
  • Spamdiagnosticmetadata: NSPM
  • Spamdiagnosticoutput: 1:99

Im working on a patch for this that will be available shortly.  The thought is that any user can use attestation regardless of the attribute security, if the user can READ/UPDATE or ADMIN a group.  The UI will be a fa├žade around the attribute security and just make that happen.  Does that sound reasonable / acceptable or do you want the attribute security too?  My thought is that it is burdensome in this case and not a requirement.

 

Thanks

Chris

 

From: [mailto:] On Behalf Of Redman, Chad
Sent: Wednesday, August 02, 2017 7:58 AM
To:
Subject: [grouper-users] RE: Non-wheel privileges for attestation access

 

The users were waiting on a fix for this, so I debugged the source code to figure out exactly what was needed for a regular user to view the attestation or mark it as Reviewed.

 

To view the attestation page:

 

1)      User needs to have Read on etc:attribute:attestation:attestationDef

2)      User needs to have Read on etc:attribute:attestation:attestationValueDef

3)      User needs both Read and Attribute Read on the group in question

 

Note that the button to mark it as reviewed shows up for these users, even though they don't have the update privilege that would make it work. They just get a user-unfriendly message about no access to the attribute definition. Checking for the correct permissions before showing the button would be helpful here.

 

 

To be able to mark the group as Reviewed:

 

1)      User needs to have Read and Update on etc:attribute:attestation:attestationDef

2)      User needs to have Read and Update on etc:attribute:attestation:attestationValueDef

3)      User needs Read on the group in question (Update isn't necessary unless you want them to edit the membership)

4)      User needs both Attribute Read and Attribute Update on the group in question

 

 

To simplify configuration slightly, we created a Readers group and an Updaters group, instead of granting individual permissions to the attribute definitions in etc:attribute. Any users who would be doing any kind of attestation work would be put into one of these groups. It's possible that it's safe to make access to the attribute definitions public, as you can only read or edit groups where you have attribute read/update anyway. We were just playing it safe there for now.

 

-Chad

 

 

 

 

From: [] On Behalf Of Redman, Chad
Sent: Wednesday, June 28, 2017 11:44 AM
To:
Subject: [grouper-users] Non-wheel privileges for attestation access

 

This sender failed our fraud detection checks and may not be who they appear to be. Learn about spoofing

Feedback

We just had our first user get an attestation recertification email, and when they tried to certify, they reported back an error: "etc:attribute:attestation:attestation attribute doesn't exist".

 

The user actually wasn't an admin for the group, but got the email because the address was explicitly set in the Email addresses field. However, in my testing using a non-wheel account, being an admin for the group is not enough. When I gave my non-wheel user admin privileges, I could reproduce the same error. The only way I could get attestation to work was to grant the user read/update on etc:attribute:attestation:attestationDef and etc:attribute:attestation:attestationValueDef. But this is not desirable, as it now allows the user to edit attestation for any group.

 

Am I looking at this the wrong way?

 

Thanks!

-Chad

 

 

 

 

 




Archive powered by MHonArc 2.6.19.

Top of Page