Authorization Service#
Added in version 2.0.
The Authorization service hosts the Access Control Resources (ACR) for every ESS Pod resource and is responsible for managing/enforcing the Access Control Policies (ACP).
Authorization Service Endpoint#
By default, the ESS Authorization Service runs from the following root URL:
https://authorization.<ESS Domain>
To change the root Authorization service URL, see
INRUPT_AUTHORIZATION_BASE_URL
.
Authorization Service and Initial ACP Policies#
When a Pod is created, like any other Pod resource, an Access Control Resource is also created for the Pod Root. The ACR is initialized with default ACP policies.
The initial policies give the Pod Owner read and write access to the Pod. These policies also specify a client matcher as well if the Authorization service’s configuration for the initial client allow list is set:
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
or if that is unset,
Disambiguation
Both Authorization Service and
Pod Storage Service have a
INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
setting.
Only the Authorization Service setting affects which clients are allowed. The Pod Storage Service is for Discovery purposes only.
A Pod’s Initial Policies are set when the Pod is provisioned. As such, updates to the operator-controlled allow lists do not affect existing Pods.
Note
Starting in 2.1, ESS uses the values in its Authorization service’s
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
(at
the time of Pod creation) to create the client matcher for the
initial ACP policies. If the setting is unset, ESS uses the values
in its Authorization service’s INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
(at
the time of Pod creation).
Using the value of the Pod owner’s WebID and an initial client allow list, ESS creates the initial policies of the form:
If allOf(AgentMatcher and ClientMatcher) evaluates to true, Then allow (Read and Write).
Specifically, ESS creates:
- Policy 1 for the Pod Root:
If the agent matches the Pod owner’s WebID, and if the client application’s Client ID has a match in the initial client allow list, allow Read and Write access.
- Policy 2 for the Pod Root’s Initial Member Policies:
If the agent matches the Pod owner’s WebID, and if the client application’s Client ID has a match in the initial client allow list, allow Read and Write access.
For more information on a Container’s Member Policies, see Member Policies.
Note
Starting in 2.1, ESS uses the values in Authorization service’s
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
(at
the time of Pod creation) to create the client matcher for the
initial policies. If the setting is unset, ESS uses the values
in its Authorization service’s INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
(at
the time of Pod creation).
If the initial client allow list is empty (when creating the policy), ESS uses the value of the Pod owner’s WebID to create initial policies of the form:
If allOf(AgentMatcher) evaluates to true, Then allow (Read and Write).
Specifically, ESS creates:
- Policy 1 for the Pod Root:
If the agent matches the Pod owner’s WebID, allow Read and Write access.
- Policy 2 for the Pod Root’s Initial Member Policies:
If the agent matches the Pod owner’s WebID, allow Read and Write access.
For more information on a Container’s Member Policies, see Member Policies.
Note
After a Pod’s initial policies have been created, changes to
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
(or INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
) do not impact the Pod’s
policies.
Configuration#
As part of the installation process, Inrupt provides base Kustomize overlays and associated files that require deployment-specific configuration inputs.
The following configuration options are available for the service and may be set as part of updating the inputs for your deployment. The Inrupt-provided base Kustomize overlays may be using updated configuration values that differ from the default values.
Required#
- INRUPT_AUTHORIZATION_BASE_URL#
The URI of the Authorization service.
- INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST#
Default:
https://podbrowser.inrupt.com/api/app
Comma-delimited list of Client IDs that determine which applications are allowed to perform read and write operations on the Access Control Resources.
In addition, the authorization server uses
INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
to initialize the default access policies for a new Pod ifINRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
is unset.Important
The Authorization service’s
INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
value must be managed with care. Only those applications with a high level of trust should be listed. This value should never be set to an empty list.Disambiguation
Both Authorization Service and Pod Storage Service have an
INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
setting.Only the Authorization Service setting affects which clients are allowed. The Pod Storage Service is for Discovery purposes only.
See also:
INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
configuration for the Pod service.
Kafka Configuration#
Tip
See also ESS’ Kafka Configuration.
- INRUPT_KAFKA_AUDITV1EVENTSENCRYPTED_CIPHER_PASSWORD#
The strong cipher key to use when running auditing with encrypted messages.
- INRUPT_KAFKA_SOLIDACCESSCONTROLRESOURCE_CIPHER_PASSWORD#
The symmetric key to use when encrypting messages (see
MP_MESSAGING_OUTGOING_SOLIDACCESSCONTROLRESOURCE_VALUE_SERIALIZER
).Warning
Set to a strong password.
- KAFKA_BOOTSTRAP_SERVERS#
Default:
localhost:9092
Comma-delimited list of Kafka broker servers for use by ESS services, including this service.
Setting
KAFKA_BOOTSTRAP_SERVERS
configures ESS to use the same Kafka instance(s) for all its Kafka message channels (e.g.,solidresource
andauditv1out
message channels). This service uses thesolidaccesscontrolresource
andauditv1out
message channels.Note
Inrupt-provided overlays default to using
KAFKA_BOOTSTRAP_SERVERS
.To use different Kafka instances for the
solidaccesscontrolresource
andauditv1out
message channels, use specific message channel configuration.See also ESS’ Kafka Configuration.
- MP_MESSAGING_OUTGOING_SOLIDACCESSCONTROLRESOURCE_VALUE_SERIALIZER#
Default:
org.apache.kafka.common.serialization.StringSerializer
The serializer used for the notification messages the service sends to Kafka.
Supported values are:
org.apache.kafka.common.serialization.StringSerializer
When set to this value, notification messages sent to Kafka are unencrypted.
Services that consume these messages will need to set their
MP_MESSAGING_INCOMING_SOLIDACCESSCONTROLRESOURCE_VALUE_DESERIALIZER
to the corresponding deserializer valueorg.apache.kafka.common.serialization.StringDeserializer
.
com.inrupt.components.kafka.encryption.EncryptMessageSerializer
When set to this value, notification messages sent to Kafka are encrypted. Services that consume these encrypted messages will need to set their
MP_MESSAGING_INCOMING_SOLIDACCESSCONTROLRESOURCE_VALUE_DESERIALIZER
configuration to the corresponding deserializer valuecom.inrupt.components.kafka.encryption.DecryptMessageDeserializer
.
Optional#
- INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST#
Default:
Comma-delimited list of Client IDs used to initialize the default access policies (specifically, the client matchers) during Pod creation.
If
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
is unset, the service uses theINRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
to initialize the policies.Important
The option only takes effect during Pod creation. Changes to
INRUPT_AUTHORIZATION_DEFAULT_ACR_CLIENT_ID_ALLOW_LIST
(orINRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST
) has no impact on existing Pods.To configure, see Set Initial Pod Clients Allow List.
Added in version 2.1.
- INRUPT_AUTHORIZATION_MAX_POD_COUNT#
Default:
10
The maximum number of Pods owned by a specific WebID.
Important
The
INRUPT_AUTHORIZATION_MAX_POD_COUNT
value must equal Pod Services’sINRUPT_STORAGE_MAX_PODS_PER_OWNER
value. When changing theINRUPT_AUTHORIZATION_MAX_POD_COUNT
value, ensure you also updateINRUPT_STORAGE_MAX_PODS_PER_OWNER
to the same value.
- INRUPT_JWT_ALLOWED_SIGNATURE_ALGORITHMS#
Default:
ES256
,RS256
A comma-separated list that specifies the allowed encryption algorithms used to sign ID tokens.
- INRUPT_JWT_ISSUER_ALLOW_LIST#
A comma-separated list of trusted Solid-OIDC issuers (i.e., identity providers).
If unset, the service accepts all Solid-OIDC issuers with the exception of those in the
INRUPT_JWT_ISSUER_DENY_LIST
.If set, the service accepts only those Solid-OIDC issuers in the list with the following exception:
If an issuer is in both
INRUPT_JWT_ISSUER_ALLOW_LIST
andINRUPT_JWT_ISSUER_DENY_LIST
, theINRUPT_JWT_ISSUER_DENY_LIST
supersedes theINRUPT_JWT_ISSUER_ALLOW_LIST
and the issuer is not accepted by ESS.
See also
INRUPT_JWT_ISSUER_DENY_LIST
.
- INRUPT_JWT_ISSUER_DENY_LIST#
A comma-separated list of disallowed Solid-OIDC issuers.
If unset, the service accepts all Solid-OIDC issuers unless
INRUPT_JWT_ISSUER_ALLOW_LIST
is set, in which case, the service only accepts those in theINRUPT_JWT_ISSUER_ALLOW_LIST
.If set, the service disallows the Solid-OIDC issuers in the list. If
INRUPT_JWT_ISSUER_ALLOW_LIST
is also set, issuers not in theINRUPT_JWT_ISSUER_ALLOW_LIST
are also disallowed.
- QUARKUS_GRPC_SERVER_PORT#
The gRPC port of the Authorization Server.
- QUARKUS_GRPC_SERVER_SSL_CERTIFICATE#
Path to the server TLS/SSL certificate.
- QUARKUS_GRPC_SERVER_SSL_KEY#
Path to a server TLS/SSL certificate key file.
- QUARKUS_GRPC_SERVER_SSL_TRUST_STORE#
Trust store file to use.
- QUARKUS_GRPC_SERVER_SSL_TRUST_STORE_PASSWORD#
Password of the trust store file.
- QUARKUS_LOG_LEVEL#
Default:
INFO
Logging level.
Additional Information#
See also https://quarkus.io/guides/all-config.