-
Notifications
You must be signed in to change notification settings - Fork 20
/
README
302 lines (210 loc) · 9 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
User Management and Access Control
==================================
Proxmox VE implements an easy but flexible way to manage users. A
powerful Access Control algorithm is used to grant permissions to
individual users or group of users.
Best Practices:
Use groups in ACLs (not individual users).
User Authentication
===================
Proxmox VE can use different authentication servers. Those
servers are listed in '/etc/pve/priv/domain.cfg', indexed by a unique
ID (called 'authentication domain' or 'realm').
User names need to be unique. We create unique names by adding the
'realm' to the user ID: <userid>@<realm>
File format 'domain.cfg'
----example domains.cfg ------------------
# an active directory server
AD: mycompany
server1 10.10.10.1
server2 10.10.10.2
...
# an LDAP server
LDAP: example.com
server1 10.10.10.2
....
------------------------------------------
There are 2 special authentication domains name 'pve' and 'pam':
* pve: stores passwords to "/etc/pve/priv/shadow.cfg" (SHA256 crypt);
* pam: use unix 'pam'
Proposed user database fields:
==============================
users:
login_name: email address (user@domain)
enable: 1 = TRUE, 0 = FALSE
expire: <integer> (account expiration date)
domid: reference to authentication domain
firstname: user first name
lastname: user last name
email: user's email address
comment: arbitrary comment
special user root: The root user has full administrative privileges
group:
group_name: the name of the group
user_list: list of login names
comment: a more verbose description
pool:
pool_name: the name of the pool
comment: a more verbose description
vm_list: list of VMs associated with the pool
storage_list: list of storage IDs associated with the pool
privileges:
defines rights required to execute actions or read
information.
VM.Allocate: create/remove new VM to server inventory
VM.Migrate: migrate VM to alternate server on cluster
VM.PowerMgmt: power management (start, stop, reset, shutdown, ...)
VM.Console: console access to VM
VM.Monitor: access to VM monitor (kvm)
VM.Backup: backup/restore VMs
VM.Clone: Clone VM or VM template
VM.Audit: view VM config
VM.Config.XXX: modify VM config
VM.Config.Disk: add/modify/delete Disks
VM.Config.CDROM: eject/change CDROM
VM.Config.CPU: modify CPU settings
VM.Config.Memory: modify Memory settings
VM.Config.Network: add/modify/delete Network devices
VM.Config.HWType: modify emulated HW type
VM.Config.Options: modify any other VM configuration
Pool.Allocate: create/remove/modify a pool.
Pool.Audit: view a pool
Datastore.Allocate: create/remove/modify a data store.
Datastore.AllocateSpace: allocate space on a datastore
Datastore.AllocateTemplate: allocate/upload templates and iso images
Datastore.Audit: view/browse a datastore
Permissions.Modify: modify access permissions
Sys.PowerMgmt: Node power management (start, stop, reset, shutdown, ...)
Sys.Console: console access to Node
Sys.Syslog: view Syslog
Sys.Audit: view node status/config
We may need to refine those in future - the following privs
are just examples:
VM.Create: create new VM to server inventory
VM.Remove: remove VM from inventory
VM.AddNewDisk: add new disk to VM
VM.AddExistingDisk: add an existing disk to VM
VM.DiskModify: modify disk space for associated VM
VM.UseRawDevice: associate a raw device with VM
VM.PowerOn: power on VM
VM.PowerOff: power off VM
VM.CpuModify: modify number of CPUs associated with VM
VM.CpuCyclesModify: modify CPU cycles for VM
VM.NetworkAdd: add network device to VM
VM.NetworkConfigure: configure network device associated with VM
VM.NetworkRemove: remove network device from VM
Network.AssignNetwork: assign system networks
role:
defines a sets of privileges
predefined roles:
administrator: full administrative privileges
read_only: read only
no_access: no privileges
We store the following attribute for roles:
role_name: the name of the group
description: a more verbose description
privileges: list of privileges
permission:
Assign roles to users or groups.
ACL and Objects:
================
An access control list (ACL) is a list of permissions attached to an object.
The list specifies who or what is allowed to access the object and what
operations are allowed to be performed on the object.
Object: A Virtual machine, Network (bridge, venet), Hosts, Host Memory,
Storage, ...
We can identify our objects by an unique (file system like) path, which also
defines a tree like hierarchy relation. ACL can be inherited. Permissions are
inherited if the propagate flag is set on the parent. Child permissions always
overwrite inherited permissions. User permission takes precedence over all
group permissions. If multiple group permission apply the resulting role is the
union of all those group privileges.
There is at most one object permission per user or group
We store the following attributes for ACLs:
propagate: propagate permissions down in the hierarchy
path: path to uniquely identify the object
user_or_group: ID of user or group (group ID start with @)
role: list of role IDs.
User Database:
To keep it simple, we suggest to use a single text file, which is replicated to all cluster nodes.
Also, we can store ACLs inside this file.
Here is a short example how such file could look like:
-----User/Group/Role Database example--------
user:[email protected]:$1$nd91DtDy$mJtzWJAN2AAABKij0JgMy1/:Joe Average:Just a comment:
user:[email protected]:$1$nd91DtDy$LANSNJAN2AAABKidhfgMy3/:Max Mustermann:Another comment:
user:[email protected]:$1$nd91DtDy$LANSNAAAAAAABKidhfgMy3/:Edward Example:Example VM Manager:
group:admin:Internal Administrator Group:root:
group:audit:Read only accounts used for audit::
group:customers:Our Customers:[email protected],[email protected]:
role:vm_user:Virtual Machine User:VM.ConfigureCD,VM.Console:
role:vm_manager:Virtual Machine Manager:VM.ConfigureCD,VM.Console,VM.AddNewDisk,VM.PowerOn,VM.PowerOff:
role:vm_operator:Virtual Machine Operator:VM.Create,VM.ConfigureCD,VM.Console,VM.AddNewDisk,VM.PowerOn,VM.PowerOff:
role:ds_consumer:DataStore Consumer:Datastore.AllocateSpace:
role:nw_consumer:Network Consumer:Network.AssignNetwork:
# group admin can do anything
acl:0:/:@admin:Administrator:
# group audit can view anything
acl:1:/:@audit:read_only:
# user max can manage all qemu/kvm machines
acl:1:/vm/qemu:[email protected]:vm_manager:
# user joe can use openvz vm 230
acl:1:/vm/openvz/230:[email protected]:vm_user:
# user Edward can create openvz VMs using vmbr0 and store0
acl:1:/vm/openvz:[email protected]:vm_operator:
acl:1:/network/vmbr0:[email protected]:ds_consumer:
acl:1:/storage/store0:[email protected]:nw_consumer:
---------------------------------------------
Basic model RBAC -> http://en.wikipedia.org/wiki/Role-based_access_control
# Subject: A person or automated agent
subject:[email protected]:
subject:[email protected]:
# Role: Job function or title which defines an authority level
role:vm_user:Virtual Machine User:
role:admin:Administrator:
# Subject Assignment: Subject -> Role(s)
SA:vm_user:[email protected],[email protected]:
SA:admin:[email protected]:
# Permissions: An approval of a mode of access to a resource
# Permission Assignment: Role -> Permissions (set of allowed operation)
perm:vm_user:VM.ConfigureCD,VM.Console:
perm:admin:VM.ConfigureCD,VM.Console,VM.Create:
---------------------------------------------
We can merge 'perm' into the 'role' table, because it is
a 1 -> 1 mapping
subject:[email protected]:
subject:[email protected]:
role:vm_user:Virtual Machine User:VM.ConfigureCD,VM.Console:
role:admin:Administrator:VM.ConfigureCD,VM.Console,VM.Create:
SA:vm_user:[email protected],[email protected]:
SA:admin:[email protected]:
-----------------------------------------------
We can have different subject assignment for different objects.
subject:[email protected]:
subject:[email protected]:
role:vm_user:Virtual Machine User:VM.ConfigureCD,VM.Console:
role:admin:Administrator:VM.ConfigureCD,VM.Console,VM.Create:
# joe is 'admin' for openvz VMs, but 'vm_user' for qemu VMs
SA:/vm/openvz:admin:[email protected]:
SA:/vm/qemu:vm_user:[email protected],[email protected]:
-----------------------------------------------
Let us use more convenient names.
Use 'user' instead of 'subject'.
Use 'acl' instead of 'SA'.
user:[email protected]:
user:[email protected]:
role:vm_user:Virtual Machine User:VM.ConfigureCD,VM.Console:
role:admin:Administrator:VM.ConfigureCD,VM.Console,VM.Create:
# joe is 'admin' for openvz VMs, but 'vm_user' for qemu VMs
acl:/vm/openvz:admin:[email protected]:
acl:/vm/qemu:vm_user:[email protected],[email protected]:
-----------------------------------------------
Finally introduce groups to group users. ACL can then
use 'users' or 'groups'.
user:[email protected]:
user:[email protected]:
group:customers:Our Customers:[email protected],[email protected]:
role:vm_user:Virtual Machine User:VM.ConfigureCD,VM.Console:
role:admin:Administrator:VM.ConfigureCD,VM.Console,VM.Create:
acl:/vm/openvz:admin:[email protected]:
acl:/vm/qemu:vm_user:@customers:
-----------------------------------------------