Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sign access decision? #55

Open
eazerad opened this issue Nov 17, 2023 · 3 comments
Open

Sign access decision? #55

eazerad opened this issue Nov 17, 2023 · 3 comments

Comments

@eazerad
Copy link
Contributor

eazerad commented Nov 17, 2023

Should the access decision be signed by the PDP private key to ensure that the payload has not been tampered with?

@tr33
Copy link

tr33 commented Nov 20, 2023

In which cases should the PEP not trust its designated PDP?

Some level of "trust" could be provided by the transport layer, e.g. via TLS.
Mutual "Trust" could also be assumed by the parties configuring PDP+PEP?

Signing + validation implies notable efforts for both parties, whilst the whole process should be as fast as possible.
It would also increase complexity on the spec and implementation.

As long as "Authorization Federation" isn't a clear concept (like with SAML-Federation) I would offload this to the transport layer and clearly assume mutual trust by the parties setting up both components.

@eazerad
Copy link
Contributor Author

eazerad commented Nov 22, 2023

For Mutual TLS, I agree that it is a transport layer responsibility but we probably need to discuss in terms of patterns we want to support and if the API we provide can accommodate future use cases. Digitally signing can increase the trust in the authorization decision furthermore if mutual trust doesn't exist before the API call is made. I wouldn't see it as a mandatory API feature but something that is optional. Are all authorization decisions required to be fast? It is ideal but it depends on use cases we want to support. Also there is a spectrum of what is fast and near real time and what can take seconds, hours or could be tied to a workflow with manual interactions so I hope we can clarify that in the use cases.

@tulshi
Copy link
Collaborator

tulshi commented Nov 27, 2023

We can add a note in the draft "Security Considerations" section that reliable mechanisms must be used to ensure PDP - PEP communication integrity, privacy and authenticity (e.g. MTLS)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants