Handling of missing HPCCInternal::<username> scope

Environment

HPCC with Azure AD LDAP authentication

Description

When the LDAP Security Manager is configured to use Azure AD, the recommended model is to let AAD admins manage the users. This means user creation, updates, deletion, password resets, etc.

Because HPCC creates the HPCCInternal::<username> scope when a user is created, the scope will never get created with AAD.

Conclusion

None

Activity

Show:

Jacob Cobbett-Smith August 31, 2023 at 4:41 PM

- should the check be changed from it's current :

if(strieq(userName.str(), user.getName())) return SecAccess_Full;

to:

if(strieq(userName.str(), user.getName()) || isSuperUser(user)) return SecAccess_Full;

?

Tony Kirk August 31, 2023 at 3:48 PM

Thanks, , but I believe I understood. Given its narrow scope and essentially consistent-enough-to-be-hard-coded approach, there is no need to have a managed file scope in LDAP for each of them.

My point is once this is hard-coded so that hpccinternal::mydogspot is handled in code, then only user mydogspot will have access. For day-to-day, no problem.

For exceptions, though, would we not need a new permission that allows assigned users/groups access to these scopes for special purposes, such as clean-up? Orphaned files have existed for various reasons (failed WUs that did not clean-up), people leave, etc.  That's all.  , know what I mean?

Russ Whitehead August 31, 2023 at 3:16 PM

Perhaps the Jira description was unclear. What I have done is removed the creation of all HpccInternal scopes, and no longer check them via LDAP.  Instead, it is hard coded to make sure the username matches the name of the internal scope (ie  user tkirk, scope hpccinternal::tkirk is granted, user wwhitehead scope hpccinternal::tkirk is denied),
Once all environments are up to date with this feature (Fix Version: 9.0.36 9.2.14 ) then you can delete all of the thousands of LDAP HpccInternal scopes.
Note that and other admins greatly disliked the old way, since they had to scroll through thousands of them in ECLWatch

Russ Whitehead August 29, 2023 at 3:48 PM

I suppose we could grant HPCC Admin's access, but I will defer that question to  

Tony Kirk August 29, 2023 at 3:43 PM

, the point is it can currently be manipulated as can any managed file scope, if necessary, such as to allow someone to delete an hpccinternal::<user_name> file created by someone who no longer has access.

Fixed
Pinned fields
Click on the next to a field label to start pinning.

Details

Components

Assignee

Reporter

Priority

Fix versions

Affects versions

Created August 9, 2023 at 3:59 PM
Updated August 31, 2023 at 4:41 PM
Resolved August 17, 2023 at 3:56 PM

Flag notifications