-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement downgrading privilege for user principals authenticated over gRPC / HTTP #1452
Comments
In the case of the HttpServerNode this requires replacing the
@tiziano88 Does this make sense? This basically doubles the number of channels that we create per request. |
Actually maybe I can merge steps 2 and 3 above, so the HttpServerNode includes the HttpRequest, the |
Thanks for the writeup @rbehjati , it makes sense to me, we can start with that, and then we may explore ways of trying to unify some of the channels or structs in the future, once we have something up and running. |
cc @daviddrysdale in case he has any suggestions or comments upfront |
Thanks. BTW, my second suggestion is not that interesting as it would require adding |
@rbehjati I believe this is already on your plate, let me know if I am mistaken. |
Yes. But I think we need to discuss it further :) I'll get back to it when I am done with the first increment of the challenge-response authentication for HTTP and gRPC. |
This can be closed for now, since the stated functionality is supported via the |
Once the challenge-response mechanism is implemented (as per #1357), the Oak Runtime should then use the result of the authentication step to determine the downgrading privilege of the client connecting to it.
The most elegant way of doing this would be to create a sort of "virtual" node per invocation that has exactly the downgrading privilege corresponding to the provided authenticated client.
For instance:
The text was updated successfully, but these errors were encountered: