Bug 1067036 - [RFE][AAA] Add an user with read only permissions (login only permission) for monitoring purposes via API
Summary: [RFE][AAA] Add an user with read only permissions (login only permission) for...
Keywords:
Status: CLOSED DUPLICATE of bug 1076971
Alias: None
Product: oVirt
Classification: Retired
Component: ovirt-engine-core
Version: 3.4
Hardware: x86_64
OS: Linux
unspecified
unspecified
Target Milestone: ---
: ---
Assignee: Yair Zaslavsky
QA Contact: bugs@ovirt.org
URL:
Whiteboard: infra
Depends On:
Blocks: oVirt-AAA-rewrite
TreeView+ depends on / blocked
 
Reported: 2014-02-19 14:31 UTC by Sven Kieske
Modified: 2015-03-05 00:19 UTC (History)
10 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2014-03-16 21:21:25 UTC
oVirt Team: ---
Embargoed:


Attachments (Terms of Use)

Description Sven Kieske 2014-02-19 14:31:17 UTC
Description of problem:
currently I am not able to add a "local" user to ovirt.
So if I just need a read only user for monitoring or other purposes
I need to setup or attach a full blown LDAP/IPA or AD server

Version-Release number of selected component (if applicable):


How reproducible:
always

Steps to Reproduce:
1.
2.
3.

Actual results:
you need to setup a complete directory server for just read only access via
api

Expected results:
ship a preconfigured user which has only login permissions.

This should still be possible to add in 3.4 as it should be a very little change!

Additional info:
See this thread on users ML:
http://lists.ovirt.org/pipermail/users/2013-November/017946.html

Comment 1 Doron Fediuck 2014-02-21 09:40:33 UTC
(In reply to Sven Kieske from comment #0)
> Description of problem:
> currently I am not able to add a "local" user to ovirt.
> So if I just need a read only user for monitoring or other purposes
> I need to setup or attach a full blown LDAP/IPA or AD server
> 
> Actual results:
> you need to setup a complete directory server for just read only access via
> api
> 
> Expected results:
> ship a preconfigured user which has only login permissions.
> 

Sven,
login only may not be sufficient in terms of the information available for this
user. Can you please specify if this user should see all available information
(similar to admin), or specific entities / stats?

Comment 2 Sven Kieske 2014-02-21 10:31:00 UTC
The user should be able to see everything, like admin.

This would be huge if it could get included, thank you!

Comment 3 Itamar Heim 2014-02-23 22:53:50 UTC
discussed here as well:
http://lists.ovirt.org/pipermail/users/2014-February/021631.html

Comment 4 Eli Mesika 2014-02-24 14:22:12 UTC
I do not think it can be included in 3.4, apart from the user addition in the engine side, support for setting the new read-only user should be added in the engine setup site. 

IMHO to late for 3.4 

Alon?

Comment 5 Alon Bar-Lev 2014-02-24 14:32:23 UTC
(In reply to Eli Mesika from comment #4)
> I do not think it can be included in 3.4, apart from the user addition in
> the engine side, support for setting the new read-only user should be added
> in the engine setup site. 
> 
> IMHO to late for 3.4 
> 
> Alon?

I do not know enough the permission model of ovirt-engine, can we have a user that sees all objects and cannot perform any change? is that supported if I, for example, add simple local openldap?

If that is possible, there is a solution for 3.3 and up, right?

In any case, such user will not be created automatically but explicitly by admin, I guess that it will be done in future using jdbc directory provider.

Comment 6 Eli Mesika 2014-02-24 21:12:11 UTC
(In reply to Alon Bar-Lev from comment #5)

> I do not know enough the permission model of ovirt-engine, can we have a
> user that sees all objects and cannot perform any change? is that supported
> if I, for example, add simple local openldap?

Yes
https://bugzilla.redhat.com/show_bug.cgi?id=1038222

Comment 7 Alon Bar-Lev 2014-02-24 21:24:05 UTC
(In reply to Eli Mesika from comment #6)
> (In reply to Alon Bar-Lev from comment #5)
> 
> > I do not know enough the permission model of ovirt-engine, can we have a
> > user that sees all objects and cannot perform any change? is that supported
> > if I, for example, add simple local openldap?
> 
> Yes
> bug#1038222

So, there is a simple solution since 3.3, just install local ldap server with single user and use this user for api.

Comment 8 Alon Bar-Lev 2014-02-24 21:26:39 UTC
(In reply to Alon Bar-Lev from comment #7)
> (In reply to Eli Mesika from comment #6)
> > (In reply to Alon Bar-Lev from comment #5)
> > 
> > > I do not know enough the permission model of ovirt-engine, can we have a
> > > user that sees all objects and cannot perform any change? is that supported
> > > if I, for example, add simple local openldap?
> > 
> > Yes
> > bug#1038222
> 
> So, there is a simple solution since 3.3, just install local ldap server
> with single user and use this user for api.

hmmm... yair... to avoid kerberos, I remember that you have some setting to use simple bind... right?

Comment 9 Yair Zaslavsky 2014-02-25 00:06:48 UTC
(In reply to Alon Bar-Lev from comment #8)
> (In reply to Alon Bar-Lev from comment #7)
> > (In reply to Eli Mesika from comment #6)
> > > (In reply to Alon Bar-Lev from comment #5)
> > > 
> > > > I do not know enough the permission model of ovirt-engine, can we have a
> > > > user that sees all objects and cannot perform any change? is that supported
> > > > if I, for example, add simple local openldap?
> > > 
> > > Yes
> > > bug#1038222
> > 
> > So, there is a simple solution since 3.3, just install local ldap server
> > with single user and use this user for api.
> 
> hmmm... yair... to avoid kerberos, I remember that you have some setting to
> use simple bind... right?

SIMPLE is not supported for several versions now...

Comment 10 Alon Bar-Lev 2014-02-25 00:10:59 UTC
(In reply to Yair Zaslavsky from comment #9)
> > hmmm... yair... to avoid kerberos, I remember that you have some setting to
> > use simple bind... right?
> 
> SIMPLE is not supported for several versions now...

Not even in some debug option?

Comment 11 Yair Zaslavsky 2014-02-25 01:16:23 UTC
(In reply to Alon Bar-Lev from comment #10)
> (In reply to Yair Zaslavsky from comment #9)
> > > hmmm... yair... to avoid kerberos, I remember that you have some setting to
> > > use simple bind... right?
> > 
> > SIMPLE is not supported for several versions now...
> 
> Not even in some debug option?

It would be too hacky IMHO.
You will need to change one of the entries at vdc_options to mark that for a given domain you would like to use SIMPLE, and even with that I'm not 100% sure it will work.

Comment 12 Sven Kieske 2014-02-25 09:04:05 UTC
(In reply to Alon Bar-Lev from comment #7)
> (In reply to Eli Mesika from comment #6)
> > (In reply to Alon Bar-Lev from comment #5)
> > 
> > > I do not know enough the permission model of ovirt-engine, can we have a
> > > user that sees all objects and cannot perform any change? is that supported
> > > if I, for example, add simple local openldap?
> > 
> > Yes
> > bug#1038222
> 
> So, there is a simple solution since 3.3, just install local ldap server
> with single user and use this user for api.

I think our understanding about what is "simple" (complete LDAP + Kerberos)
really differ a lot.

Also keep in mind:


(In reply to  Yair Zaslavsky from comment #9)
> SIMPLE is not supported for several versions now...

;)

To be more specific: What this RFE asks for is not a method to plugin
outside authentication, but a _builtin_ user.

What would be less cool, but still not that much work like a full LDAP (which you have to secure, patch, etc.) would be an additional local unix user in e.g. /etc/passwd

To reiterate:

I was asking for a simple read only user role which works out of the box, or nearly out of the box instead of connecting to an LDAP or AD.
You tell me to install an LDAP Server.

Thats more like taking a sledgehammer to crack a nut, you know?

Thanks for your efforts so far, anyway!

Comment 13 Alon Bar-Lev 2014-02-25 09:31:28 UTC
(In reply to Sven Kieske from comment #12)
> I was asking for a simple read only user role which works out of the box

I do not know what is user that works out of the box.

Setup will perform the minimum tasks to have engine up and running, as far as users are involved, it will only set up admin user.

From this point the admin can customize the product as he sees fit, including adding additional users with specific attributes.

As written in previous corresponding, the ability to extend the authentication  and authorization is scheduled for 3.5, the steps would probably:

1. add jdbc authentication and authorization providers
2. create a table for its usage
3. add users.

Maybe we will have enough time to replace the internal authentication and authorization provider that supports only admin with that extension, not in priority compared to having proper LDAP interaction.

Comment 14 Alon Bar-Lev 2014-03-16 21:21:25 UTC
Replacing the "internal" provider with a provider that is capable of managing local users will solve this as well, dup of bug#1076971.

*** This bug has been marked as a duplicate of bug 1076971 ***


Note You need to log in before you can comment on or make changes to this bug.