Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Story | Enforce Default Structural Authorizations for DP/CP APIs #19

Open
maxyu1115 opened this issue Aug 28, 2023 · 0 comments
Open

Story | Enforce Default Structural Authorizations for DP/CP APIs #19

maxyu1115 opened this issue Aug 28, 2023 · 0 comments
Labels
story Medium sized tasks
Milestone

Comments

@maxyu1115
Copy link
Collaborator

As the default behavior, we'd like to enforce the following:

  • CP APIs can only modify nodes below the user, such as user1 can have control over user1.A.B:C, but not over user2:X
  • DP API memorize can only write to corpuses directly below the user (? To be debated if this is necessary)
  • DP API recall can read only from corpuses that belong to the user, or belong to direct ancestors. Such as companyA.team1.user1 can read from the corpus companyA:C, but not companyA.team2:X. (This is for sharing corpuses at a higher level)

These default behaviors are based on the structure of the namespace, and should be intuitive/natural in most cases.

Note that this is also a temporary implementation. In the future we will be doing policy/role based authorization, in which case even though we likely want to maintain these default behaviors, we would implement them as policy/roles.

TRACKS: #13

@maxyu1115 maxyu1115 added the story Medium sized tasks label Aug 28, 2023
@maxyu1115 maxyu1115 added this to the v1.0 milestone Aug 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
story Medium sized tasks
Projects
None yet
Development

No branches or pull requests

1 participant