Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How does replication and portable authorizations work? #67

Open
dmitrizagidulin opened this issue Sep 2, 2021 · 1 comment
Open

How does replication and portable authorizations work? #67

dmitrizagidulin opened this issue Sep 2, 2021 · 1 comment
Labels
ready for PR Ready for Pull Request

Comments

@dmitrizagidulin
Copy link
Contributor

If I have a document on an encrypted data vault A, https://example.com/edvs/z4sRgBJJLnYy/documents/zMbxmSDn2Xzz, and and I have an authorization/capability for that document, how does the EDV spec ensure that when the document is replicated to another vault B, that my authorization works for that replica also?

(See also the discussion over at #52 )

@dmitrizagidulin dmitrizagidulin added the question Further information is requested label Sep 2, 2021
@dmitrizagidulin
Copy link
Contributor Author

Discussed on Sep 30, 2021 call.

Q: Do we consider replication to cross trust boundaries?

  • Who controls (the key to) the vaults?
  • Who is hosting them (who owns/controls the machines it's hosted on)
  • Are the vaults on different domains?
  • There's a difference between a multi-tenant hosting service EDV, and a single-tenant EDV.

It's important to understand the various use cases. (see Replication use cases doc.)

  • Dave Longley: If the replication crosses trust boundaries, then you're going to need a different authorization (capability/token)
  • Dave Longley: If it's WITHIN the same trust boundary, you'd want to make the authorization the same (no need to complicate the interface).
  • Adrian: How do resources controlled by multiple entities play into this?
  • Dave Longley: in terms of the authorization data model, if you're crossing web domains/origins, you're crossing trust boundaries (it does not matter that both domains are controlled by the same entity). This is how the general browser security model works, too.

Proposal: in the spec, when we're talking about replication and authorization, we should add a section (and give examples) of this, that when you're hosting on different domains, you're crossing trust boundaries (and its effect on the authz data model).

@DRK3 DRK3 added ready for PR Ready for Pull Request and removed question Further information is requested labels Oct 28, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ready for PR Ready for Pull Request
Projects
None yet
Development

No branches or pull requests

2 participants