Access Control Lists

OliveTin uses Access Control Lists (ACLs) to implement it’s security model, which allows you to have fine-grained control over indivividual actions or groups of actions. This can be used to implement role based access control (RBAC), or other security models that you may need.

ACLs are built up of the following set of rules;

  • name - The name of the ACL. This is used to identify the ACL in the configuration file.

  • matchUsergroups - A list of usergroups that this ACL applies to. This is used to match users that are in the specified usergroup.

  • matchUserNames - A list of usernames that this ACL applies to. This is used to match users that are in the specified usergroup.

  • permissions - A set of permissions which are used with actions. eg: view, exec, logs, etc.

    • addToEveryAction - A boolean value that indicates if this ACL should be added to every action. This is useful if you want to apply the same ACL to all actions, without having to manually add it to each action.

  • policy - A policy is a set of rules that affect the whole of OliveTin.

ACLs and Policies (global)

sample

Policies are a set of rules that apply to the whole of OliveTin ("global"), and not just to individual actions (like permissions are).

The defaultPolicy is special, in that all values are set to true by default. This means that if you do not set a defaultPolicy, then all policies will be set to true by default. This is effectively what the defaultPolicy is set to;

defaultPolicy:
  showDiagnostics: true
  showLogList: true

You can override defaults using an ACL, like this;

accessControlLists:
  - name: admins
    matchUsergroups:
	  - admins
	policy:
	  showDiagnostics: true
	  showLogList: true

defaultPolicy:
  showDiagnostics: false
  showLogList: false

ACLs and Permissions (for Actions)

sample

An action always starts with defaultPermissions (see below), and then then have one or more ACLs applied to it. This means that you can for example have an action that is only available to a certain group of users, or only to a single user.

Let’s say you have a user james and a usergroup admins. You can then create an ACL that only allows james and users in the admins group to view and execute an action.

You can specify default permissions for all actions by changing the defaultPermissions like this;

config.yaml
defaultPermissions:
  view: false
  exec: false
  logs: true

In the example above, all users will start off with the permissions to only see action logs - but will not be able to view or execute actions.

It is then possible to add an "admins" ACL on top of every action. In the example below, we define one extra ACL called "admins", which matches any users with the usergroup also called "admins". This ACL will then be applied to all actions, and will allow users in the "admins" usergroup to view and execute the action.

config.yaml
defaultPermissions:
  view: false
  exec: false

accessControlLists:
  - name: admins
    matchUsergroups:
      - admins
    permissions:
      view: true
      exec: true

actions:
  - title: Shutdown Reactor
    acls:
      - admins

Add an ACL to every action

Sometimes you want to define an ACL that applies to all actions. It can be tedious and error prone to manually add the ACL under the "acls" list for every action, if you have several actions. Instead, there is a shortcut to add an ACL to all actions - addToEveryAction: true.

config.yaml
accessControlLists:
  - name: admins
    matchUsergroups:
      - admins
    permissions:
      view: true
      exec: true
    addToEveryAction: true

ACL Matching - usernames and usergroups.

You can match users based on their usergroup which is the most common, but it is also possible to match based on the user’s username.

config.yaml
accessControlLists:
  - name: admins
    matchUsergroups:
      - admins
    permissions:
      view: true
      exec: true

  - name: james
    matchUserNames:
      - james
    permissions:
      view: true
      exec: true