You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Developers may wish to use a RBAC Authorization scheme into their service actors and partitions, allowing them to more easily permit different levels of access to partitions or entities stored within CanDB. Having an RBAC service (that uses CanDB) allows an application to more easily associate principals with more complex and specific permissions, and allows for these permissions to be universally trusted and accepted across a multi-canister application.
Requirements
RBAC actor that allows applications to store principal to role relations
Generates JWT or other AuthZ token to wrap the user’s roles with a TTL & mechanism to combat replay attacks
Mechanism for one-time dispersal of public key to existing service actors in order to efficiently authorize the caller without requiring an inter-canister call every time.
The text was updated successfully, but these errors were encountered:
Motivation
Developers may wish to use a RBAC Authorization scheme into their service actors and partitions, allowing them to more easily permit different levels of access to partitions or entities stored within CanDB. Having an RBAC service (that uses CanDB) allows an application to more easily associate principals with more complex and specific permissions, and allows for these permissions to be universally trusted and accepted across a multi-canister application.
Requirements
The text was updated successfully, but these errors were encountered: