...
SecurityUtils
is an important class because it shields client code from the complexity of the security implementation (e.g. voters, ACL holders, etc). Below is a class diagram along with the two clients that use SecurityUtils
for authorization purposes.
Panel | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||
|
|
|
|
|
| .
|
|
| |||||||||||||||||||||
Panel | |||||||||||||||||||||||||||||
bgColor | #FFFFFF |
| |||||||||||||||||||||||||||
Panel |
---|
Panel |
---|
Panel | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Solution Repository ObjectsOnce you have a container for an ACL, how is it associated with objects in the solution repository? That is where the interface PersistenceThe Pentaho BI Platform uses Hibernate for reading and writing to the db-based repository. The
|
FILE_ID | PARENT | FILENAME | FULLPATH | DATA | DIRECTORY | LASTMODIFIED |
FILE_ID
is the primary key. PARENT
is a reference (by file id) to the object's parent. DIRECTORY
is a boolean that is true if this object is a directory and false if this object is a file.
PRO_ACLS_LIST
Table
ACL_ID | ACL_MASK | RECIPIENT |
Technically, rows in this table represent ACL entries, not ACLs. An ACL for an object can be created by querying for all rows sharing the same ACL_ID
. ACL_ID
is a foreign key that references PRO_FILES.FILE_ID
. ACL_MASK
is the decimal representation of the bit mask that represents the permissions in this ACL entry. And RECIPIENT
is the username or granted authority that is the recipient of this ACL entry.
Voters
For every domain object, there is exactly one access control list. Add to that a user that wants to perform some operation on that object and that adds up to three inputs: a recipient, an operation, and an ACL. But what makes the "access granted" or "access denied" decision given these three pieces of information? The answer to that question is an IAclVoter
. An instance of IAclVoter
contains an all-important hasAccess
method. It takes the three aforementioned inputs and returns a boolean result: true
meaning access granted and false
meaning access denied. An ACL voter is a singleton; there is only one instance per Java virtual machine. It is specified in pentaho.xml
.
One might ask: How many ways can a voter arrive at a decision? Assume that user sally
has the following granted authorities: ROLE_DEV
and ROLE_MGR
. Also assume that the ACL for a particular object contains the following entries: (sally
, read
), (ROLE_DEV
, readwrite
). Both ACL entries are applicable to sally
since the first specifies sally
(and she is sally
) and the second specifies ROLE_DEV
(and she has been granted the ROLE_DEV
authority). Should the voter grant or deny a request to write to the object associated with this ACL? This is where extensibility of the voting system comes in. The Pentaho BI Platform provides multiple implementations of IAclVoter
that each make different decisions in this situation! As the user of the platform, you decide how access decisions are made through your choice of IAclVoter
. For more information about IAclVoter
implementations, see 12. IAclVoter Node.
Panel | ||||
---|---|---|---|---|
| ||||
Panel |
---|
Panel |
---|
|
ACL Management
Note: There have been recent changes to the Permissions Editor that are reflected in this document.
...
- Click Add under the access control list entry table. You see a new list appear on the right that lists all roles and users available to the system.
- Select the roles and/or users that you want to grant permissions to, and then select the permissions that you would like them to receive.
- Click Add at the bottom of the New Permission panel to add your newly defined access control list entries.
Tip title Handy Hint If your organization has many users and/or you want to create ACL entries using roles only, you can increase performance by adjusting the settings containing contained in the
access-ui
node inpentaho.xml file
.
ACL Publishing
The db-based solution repository is refreshed from the file system. In other words, solution repository objects are created as files on the filesystem and those objects are refreshed (published) in the db-based solution repository. In the files ystem, solution repository objects have no associated ACLs--at least as far as the platform is concerned. But once solution repository objects are published to the db-based repository, they do have associated ACLs. So how did the objects get their ACLs? The answer is an IAclPublisher
. There is only one IAclPublisher
instance per JVM and the type of that instance is specified in pentaho.xml
. For more information about IAclPublisher
implementations, see 13. IAclPublisher Node.
...