Reviews run for a minimum of one week. The outcome of the review is decided on this date. This is the last day to make comments or ask questions about this review.
Use cases in the industrial internet often have requirements for access control that are not satisfied by standards that are prevalent in the consumer space. For example, standards like OAuth 2.0 model privileges as flat lists of coarse-grained scopes that are granted for the entire user login session. Newer standards like UMA allow for finer-grained access control but do so in ways that require more client-side complexity. Additionally, Neither of these standards define a common way to write policies or manage privileges.
Meanwhile, in the enterprise space, the XACML standard has slowly gained traction. While XACML is a comprehensive standard, our experience has proved that it is costly to implement and comes with a steep learning curve. Thus, we decided to build a service that offered a simplified and comprehensive Attribute Based Access Control (ABAC) for RESTful APIs.
The Eclipse Keti project provides an access control service that protects RESTful APIs from unauthorized access.
Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC).
The solution itself is implemented as a cloud-native RESTful API that adheres to the guiding principles of the twelve factor app. Key characteristics of the service include:
- Central management of policies and privileges
- The ability to manage hierarchical privileges (e.g. sub-groups) and scoped privileges (e.g. assigning elevated privileges based on the resource accessed)
- A policy format tailored for developers who build RESTful APIs
- An access control decision engine
Spring Boot is the primary framework that Keti is built on. Additionally Keti uses the following open source libraries:
- Titan DB, an implementation of Apache TinkerPop, for it's graph data structure
- Jedis as a Redis client for caching
- Spring Security to protect it's API
- Spring Data JPA for persistence to RDBMS
An operator deploys Keti in the same datacenter where the web services it protects are deployed. Either a common gateway, or the web service itself, sends requests for authorized access to Keti and enforces the decision received in the response. When deployed, Keti typically has the following service dependencies.
- UAA as an OAuth server
- Redis (optional) for decision caching
- Cassandra through Titan DB for graph persistence
- PostgreSQL, or H2 as a RDBMS
Below is a basic diagram of how Keti fits in the interaction between web application and web service.
The context of this work and the resources that it will protect are related to IOT use cases. Eclipse has a nexus of IOT related projects, and companies that support them, and the Keti project fits well together with them.
We will provide a full inital release of the code. We own the copyright, and a number of companies have expressed an interest in joining the effort. We have performed scans on the code and can list all dependencies.
The initial contribution, which will include working builds, will happen shortly after acceptance.
- Support for managing multiple policy sets
- Support for generic OAuth servers
- Support for Basic authentication
- Connectors for merging attributes from LDAP and SQL stores