Previous Topic: Access Level RelationshipsNext Topic: Managing Grids


Example Security Scheme with RBAC

CA AppLogic® does not provide an extensive scheme of pre-defined groups and users. This allows grid administrators to set up users, groups and object access to suit each particular situation. In general, grid administrators follow these steps:

The following scenario provides a practical example of how this process can work to effectively control user access.

Ace Starships Incorporated (ASI) builds space craft. Each space craft includes software systems for life support and propulsion among many others. These two software systems are developed on a large shared CA AppLogic® grid before being deployed to production grids on actual space craft. The development process on this grid includes the following parties:

In addition we also have:

Furthermore:

One of the first decisions to make in this scenario is whether to manage group membership using the company-wide directory, or whether to manage this membership using local groups. In this example we take the first approach:

Going forward with our example, the initial CA AppLogic® user, who is a member of the local group admin, performs the following user and group set up:

The following tables show group membership in our scenario:

Global Group

Members

life_support

individual global users - this group is maintained outside of CA AppLogic®

propulsion

individual global users - this group is maintained outside of CA AppLogic®

QA

individual global users - this group is maintained outside of CA AppLogic®

auditors

individual global users - this group is maintained outside of CA AppLogic®

Local Group

Members

admin

local user john_adams

grid_operators

local user jane_osprey

outsiders

individual local users

app_developers

local group outsiders and the global groups life_support, propulsion and QA

The following table shows access level rights granted to principals for pertinent objects in our scenario:

Object

Principal

Access Level

 

Scope

Type

Name

 

grid

local

group

admin

grid_administrator

 

local

group

grid_operators

grid_operator

 

local

group

app_developers

app_developer

 

global

group

auditors

monitor

catalog life_support

global

group

life_support

full

 

global

group

propulsion

configure

catalog propulsion

global

group

propulsion

full

catalog outsiders

global

group

outsiders

full

 

local

group

app_developers

configure

The initial set up of users and groups is now complete. At this point global users belonging to the global groups life_support, propulsion, QA and auditors can all log in to the grid, and each user is automatically provided the necessary access level rights to perform their work.

Access to the global catalogs has also been set up so that appliances are accessible as required, but only members of the group which has full access level rights on a catalog can perform destructive operations on that catalog.

When a user creates a new application, that user becomes the application owner and is granted full access level rights on that application. At some point, the user may want to modify the application ACL to give other members of his development team, or of another team, access to the application. For example: