Use cases in the industrial internet often have requirements for access control that are not satisfied by standards that are prevalent in the consumer space. For example, standards like OAuth 2.0 model privileges as flat lists of coarse-grained scopes that are granted for the entire user login session. Newer standards like UMA allow for finer-grained access control but do so in ways that require more client-side complexity. Additionally, Neither of these standards define a common way to write policies or manage privileges.
Meanwhile, in the enterprise space, the XACML standard has slowly gained traction. While XACML is a comprehensive standard, our experience has proved that it is costly to implement and comes with a steep learning curve. Thus, we decided to build a service that offered a simplified and comprehensive Attribute Based Access Control (ABAC) for RESTful APIs.
The Eclipse Keti project provides an access control service that protects RESTful APIs from unauthorized access.
Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC).
The solution itself is implemented as a cloud-native RESTful API that adheres to the guiding principles of the twelve factor app. Key characteristics of the service include:
- Central management of policies and privileges
- The ability to manage hierarchical privileges (e.g. sub-groups) and scoped privileges (e.g. assigning elevated privileges based on the resource accessed)
- A policy format tailored for developers who build RESTful APIs
- An access control decision engine
Spring Boot is the primary framework that Keti is built on. Additionally Keti uses the following open source libraries:
- Titan DB, an implementation of Apache TinkerPop, for it's graph data structure
- Jedis as a Redis client for caching
- Spring Security to protect it's API
- Spring Data JPA for persistence to RDBMS
An operator deploys Keti in the same datacenter where the web services it protects are deployed. Either a common gateway, or the web service itself, sends requests for authorized access to Keti and enforces the decision received in the response. When deployed, Keti typically has the following service dependencies.
- UAA as an OAuth server
- Redis (optional) for decision caching
- Cassandra through Titan DB for graph persistence
- PostgreSQL, or H2 as a RDBMS
Below is a basic diagram of how Keti fits in the interaction between web application and web service.
The context of this work and the resources that it will protect are related to IOT use cases. Eclipse has a nexus of IOT related projects, and companies that support them, and the Keti project fits well together with them.
- Support for managing multiple policy sets
- Support for generic OAuth servers
- Support for Basic authentication
- Connectors for merging attributes from LDAP and SQL stores
The initial contribution, which will include working builds, will happen shortly after acceptance.
Bosch Software Innovations GmbH
We will provide a full inital release of the code. We own the copyright, and a number of companies have expressed an interest in joining the effort. We have performed scans on the code and can list all dependencies.
- Log in to post comments
IoT or Runtime?
Submitted by Julien Vermillard on Thu, 09/22/2016 - 12:00
Hi,
Looks great! Just a question: why limit it to IoT and not put it in "runtime" ? Because after taking a look at the code the scope looks broader than connected objects (a bit like jetty, which is a runtime project).
I agree with Julien, this
Submitted by Kai Hudalla on Tue, 09/27/2016 - 04:54
In reply to IoT or Runtime? by Julien Vermillard
I agree with Julien, this seems to have a much broader applicability than just IoT :-)
Kai
Interested Party
Submitted by Kai Hudalla on Tue, 09/27/2016 - 04:55
Please add Bosch Software Innovations GmbH as an interested party.
Thanks,
Kai