-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User authorization framework #101
Comments
@Bento007 should this epic have linked subtasks for a Q3 milestone or should this be iceboxed for now? Removing the GA tag since that's outdated |
#101 is the only task yet to be completed and this should be completed in Q3. These are the related tickets. |
@stahiri @Bento007 this seems a bit circular. The Epics #99 and #101 refer to each other and the language is almost the same. Suggestion:
|
Relates to HumanCellAtlas/fusillade#232 |
Note: Epic #99 is closed |
Need
The concrete need as expressed in user stories:
As a DCP developer, I want an authorization API for determining if a given user is permitted to perform a given action on the DCP (such as downloading data), so that I can control which actions that user can perform.
As a DCP developer, I want python bindings for the DCP's authorization API, so that it is easier to integrate my service with our authorization API.
Definition of done
Context
As the Data Coordination Platform, we want to be protected, to protect each of our services from each other, and to protect the human subjects data we have. This requires authn and authz on our endpoints and on any access routes.
All components in a secure and federally compliant system need to have four main features: authentication #73 , authorization (also #99 ), audit trails #103 , and encryption #102 in other tickets. Even if hosting public data, a system containing Federal Government data still needs to have these features for all of the administrative and operational components to maintain integrity. This has the added benefit of enabling reuse of components in more settings than the HCA. Even though the first use of the DCP Blue Box (HCA) is an open data store, we need to add authentication to components of the DCP. Some of these will be operations-facing, those that are user-facing will be configurable so that they can be turned off during HCA DCP deployment.
The text was updated successfully, but these errors were encountered: