mirror of
https://github.com/keiffster/program-y.git
synced 2026-04-03 08:29:42 -06:00
Authorisation framework for bot... #272
Labels
No labels
News
News
News
News
News
News
News
News
bug
bug
bug
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
dependencies
enhancement
enhancement
enhancement
enhancement
enhancement
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github/program-y#272
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @seghcder on 7/6/2017
As mentioned in #51 , Program Y assumes that if you can reach it, you can use it. In a Skype For Business enterprise context, I need to check if the user connecting -
For now I have only implemented point 1. Here's my approach:
Created an authorisation pre-proccessor along these lines -
CheckUserAuthFailed then points to a grammar along these lines:
The authservice is just another service defined along normal Program-Y guidelines. The idea is future authorisation checks can be done via service calls or grammar.
In the authservice, I then maintain a list of currently authorised users.
(This assumes that someone using the CONSOLE app must have general access)
Then, when checkUserAuth is called -
The AuthUser API does the back-end service call to actually check the user is known, for example against the ticket system or in an Active Directory. This way the user is not re-authenticated against the master every time they ask a question.
Next steps are to flesh out the role / service-level authorisation model.
If there are any thoughts / comments / ideas / problems with the above approach, please do comment :-)