From ca9a43d9423f4f09bd9218f5791039e6155c7956 Mon Sep 17 00:00:00 2001 From: vasanth Date: Mon, 19 Aug 2024 14:44:49 +0530 Subject: [PATCH] Refactored the content --- README.md | 102 ++++++------------------------------------------------ 1 file changed, 11 insertions(+), 91 deletions(-) diff --git a/README.md b/README.md index 83d743ce..bf68667e 100644 --- a/README.md +++ b/README.md @@ -8,8 +8,6 @@ ![IUDX](./docs/iudx.png) # DX Access Control List (ACL) Access Policy Domain (APD) Server - -# Explanation ## Introduction The Data Exchange (DX) Access Control List (ACL) based Access Policy Domain (APD) is used for creating, requesting and managing policy. Provider, provider delegates could @@ -18,103 +16,25 @@ Policies are verified by Data Exchange (DX) Authentication Authorization and Acc allow consumer, consumer delegates to access the resource.

- +

-## Tokens, Users and Roles -### Tokens used in DX -- Tokens for a user could be created using DX AAA Server API : [link to the API docs](https://authorization.iudx.org.in/apis#tag/Token-APIs/operation/post-auth-v1-token). The token used in DX are : - -| Token | Purpose | Users | -|:------------------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------------------------------------------------| -| Identity token | Serves as an identifier of the user to the server to access the ACL-APD Server's capabilities | Provider, provider delegate, consumer, consumer delegate, cos admin, admin | -| Bearer token | Access token as bearer credential is generated by Keycloak by providing the client's email ID and password and then adding bearer to the access token : `bearer ` | DX AAA Server, Users | -| Access token | To get access to resource, resource group | Provider, provider delegate, consumer, consumer delegate | - -### Tokens accepted in ACL APD Server -Identity token, bearer token is used in ACL-APD. Identity token is used for user specific APIs, bearer token is used for Verify API call. -Provider, Consumers and delegates of provider and consumers are allowed to access the following APIs: - -| API | Users | Token | -|:------------------------|:--------------------------------------------------------:|:----------------| -| Create Policy | Provider, provider delegate | Identity token | -| Update access request | Provider, provider delegate | Identity token | -| Delete Policy | Provider, provider delegate | Identity token | -| Create Access Request | Consumer, consumer delegate | Identity token | -| Withdraw access request | Consumer, consumer delegate | Identity token | -| Get Policies | Consumer, provider, consumer delegate, provider delegate | Identity token | -| Get Access Requests | Consumer, provider, consumer delegate, provider delegate | Identity token | -| Verify Policy | DX AAA Server | Bearer token | - - -
-Users and Roles -
- -- How is the user considered as a consumer, provider or delegate? - - If the **role** in token fetched from DX AAA Server is **provider**, **consumer** - - A user is considered as a delegate of the consumer if **role** is **delegate** and **drl** is **consumer** - - A user is considered as a delegate of the provider if **role** is **delegate** and **drl** is **provider** - -## Terminologies and Definitions -- Policy : An agreement or contract between the owner of the resource to allow the consumer to access the resource -- Notification : (or access request) Is a requisition from consumer to owner of the resource to access the resource -- Constraints: (or capabilities) Are different methods in which information related to resource can be fetched -- Policy Status : Policy could be in either of these states - active, deleted or expired -- Notification Status: Notification could be in either of these states - pending, granted, rejected, withdrawn -- Delegate : Consumer or provider appointed user who could act on behalf of the delegator - ## Features +The features of the DX ACL APD is as follows: - Allows provider, provider delegates to create, fetch, manage policies over their resources -- Allows consumers fetch policies, request access for resources by sending email notifications to the provider, provider delegates -- Emails are sent asynchronously using Vert.x SMTP Mail Client -- Integration with DX AAA Server for token introspection to serve data privately to the designated user +- Allows consumers, consumer delegates to fetch policies, request access for resources +- Emails are sent asynchronously using Vert.x SMTP Mail Client to the provider, provider delegates for resource access requests +- Integrates with DX AAA Server for token introspection to verify access before serving data to the designated user +- Integrates with AX Auditing server for logging and auditing the access for metering purposes - Uses Vert.x, Postgres to create scalable, service mesh architecture -- Integration with auditing server for metering purposes - -## Solution Architecture -The following block diagram shows different components/services used in implementing the ACL-APD server. -![Solution Architecture](./docs/acl-apd-solution-architecture.png) -The above setup allows specific high load containers/services to scale with ease. Various services of the resource server are detailed in the sections below. - -### API Server -An API server is an HTTPS Web Server and serves as an API gateway for actors (consumers, providers, DX AAA Server) to interact with the different services provided by the DX ACL APD Server. -These services (as described below) may be database read/write services.
-It is also responsible for calling the Authorization Server (via the authorization service) to authenticate and authorize access to resources. - -### Database Module -Postgres is called by the specific services like Policy service, Notification service, Auth service for policy, access-request related CRUD operations, to store email, first name and last name of the user requesting the APIs. While fetching access requests, policies from the database response are processed and displayed according to the newly created or updated records. - -### Auditing Service -The Data Broker is used by the API Server to log information related to successful creation, deletion of policies and successful creation, updation, and deletion of access requests. - -### Authentication Service -The authentication service interacts with the DX AAA Server to validate tokens provided by a consumer of a protected resource and to fetch information about the user. - -### Policy Service -The policy service is used to create, delete or list policies, for the resources owned by the provider -. Delegates of the provider could manage policies on behalf of the provider. -They could provide user specific constraints while creating a policy for a certain consumer for a given resource. -While creating a policy, the owner of the resource or provider delegate, provides ID of the resource, consumer email ID, constraints like subscription, file, async etc., along with policy expiry time in `yyyy-MM-dd'T'HH:mm:ss` format for consumer to access the resource. -By default the policy would expire in 12 days (if the expiry time is not provided). -The provider or delegate of the provider can also withdraw an active policy by providing the policy ID. -After the policy is successfully created, owner, consumer, delegates can view all the information related to the user policies. -DX AAA Server checks if any policy is present for the given resource by using the verify policy API. -Verify policy returns the constraints to access the resource for the active policy. -### Notification Service -Consumer or consumer delegates could request the provider to access the resource by providing information of the resource like it's ID -and additional information related to the purpose for which the resource is being accessed. -Academia, research, non-commercial could be listed down to access the resource to help the provider take an informed decision while approving the request. -An email is sent to the provider and provider delegates to approve or reject the request by visiting the provider panel. -While approving the access request, information like access constraints, ID of the access request, expiry time in `yyyy-MM-dd'T'HH:mm:ss` format to access the resource when the policy is created could be provided. -If the consumer or consumer delegate no longer wants to create the access request or if an active policy for the given access request is present, -the consumer could withdraw the pending access request by providing it's ID. -After the access request is created, all the information regarding access request could be viewed by the user. +# Explanation +## Understanding ACL APD +The section available [here](./Solution_Architecture.md) explains the components/services used in implementing the ACL-APD server. # How To Guide ## Setup and Installation -SETUP and installation guide is available [here](https://github.com/datakaveri/iudx-acl-apd/blob/main/docs/SETUP-and-Installation.md) +Setup and Installation guide is available [here](./SETUP-and-Installation.md) # Tutorial ## Tutorials and Explanations @@ -126,7 +46,7 @@ SETUP and installation guide is available [here](https://github.com/datakaveri/i API docs are available [here](https://acl-apd.iudx.org.in/apis) ## FAQ -FAQs are available [here](https://github.com/datakaveri/iudx-acl-apd/blob/main/docs/FAQ.md) +FAQs are available [here](./FAQ.md) ## Contributing Please find information about contributing [here](https://github.com/datakaveri/iudx-acl-apd/blob/main/CONTRIBUTING.md)