Re: [OpenDaylight Discuss] On multi-tenancy support
Luis Gomez
Hi Dave, Thanks for this detailed information. I will ask more in case of questions. BR/Luis
On Aug 4, 2014, at 8:40 AM, Lenrow, Dave <david.lenrow@...> wrote:
|
|
AAA Status meeting moved this week only 1 hour later
Nguyen, Liem Manh <liem_m_nguyen@...>
Unless someone has a WebEx key, we will be meeting on Hangout:
Thanks,
Liem
|
|
maven build fail for feature-aaa
George Zhao <George.Y.Zhao@...>
Hi I don’t know if someone already filed a bug for this or not, when I tried to do a maven build from head, I got the following error.
It looks like something related to karaf.
[INFO] Reactor Summary: [INFO] [INFO] commons.aaa ....................................... SUCCESS [6.320s] [INFO] aaa.project ....................................... SUCCESS [0.236s] [INFO] aaa-authn-api ..................................... SUCCESS [6.825s] [INFO] aaa-authn ......................................... SUCCESS [4.338s] [INFO] aaa-authn-sts ..................................... SUCCESS [11.565s] [INFO] aaa-authn-store ................................... SUCCESS [7.415s] [INFO] aaa-authn-sssd .................................... SUCCESS [0.793s] [INFO] aaa-authn-keystone ................................ SUCCESS [1.109s] [INFO] aaa-idmlight ...................................... SUCCESS [0.946s] [INFO] aaa-authz ......................................... SUCCESS [0.101s] [INFO] aaa-authz-model ................................... SUCCESS [14.978s] [INFO] features-aaa ...................................... FAILURE [2.203s] [INFO] ------------------------------------------------------------------------ [INFO] BUILD FAILURE [INFO] ------------------------------------------------------------------------ [INFO] Total time: 1:02.122s [INFO] Finished at: Sat Aug 09 22:37:47 PDT 2014 [INFO] Final Memory: 52M/124M [INFO] ------------------------------------------------------------------------ [ERROR] Failed to execute goal org.apache.karaf.tooling:karaf-maven-plugin:3.0.1:features-create-kar (features-create-kar) on project features-aaa: Failed to create archive: Could not find artifact org.opendaylight.aaa:features-aaa:cfg:clients:0.1.0-SNAPSHOT in opendaylight-release (http://nexus.opendaylight.org/content/repositories/opendaylight.release/) [ERROR] [ERROR] Try downloading the file manually from the project website. [ERROR] [ERROR] Then, install it using the command: [ERROR] mvn install:install-file -DgroupId=org.opendaylight.aaa -DartifactId=features-aaa -Dversion=0.1.0-SNAPSHOT -Dclassifier=clients -Dpackaging=cfg -Dfile=/path/to/file [ERROR] [ERROR] Alternatively, if you host your own repository you can deploy the file there: [ERROR] mvn deploy:deploy-file -DgroupId=org.opendaylight.aaa -DartifactId=features-aaa -Dversion=0.1.0-SNAPSHOT -Dclassifier=clients -Dpackaging=cfg -Dfile=/path/to/file -Durl=[url] -DrepositoryId=[id] [ERROR] [ERROR] [ERROR] org.opendaylight.aaa:features-aaa:cfg:0.1.0-SNAPSHOT [ERROR]
|
|
Project dependency question
George Zhao <George.Y.Zhao@...>
Hello,
I saw on the spreadsheet, AAA has dependencies on Yangtools and MD-SAL, however, I can only see yangtools dependency through maven pom.xml, I wonder if someone can explain to me where is the MD-SAL dependency coming from?
Thanks,
George
|
|
Re: Project dependency question
Wojciech Dec
Hi, MD-SAL dependency is coming in from the AuthZ service piece, which hasn't been committed yet. Moreover the APIs generated by Yangtools depend on the MD-SAL broker components to get them to work.
On 10 August 2014 08:28, George Zhao <George.Y.Zhao@...> wrote:
|
|
Re: [OpenDaylight Discuss] On multi-tenancy support
Wojciech Dec
Hi Luis, the currently proposed AuthZ service data-model + API factor in a multi-tenancy aspect by allowing authorization policies for resources to be nested covering multiple domains.
On 4 August 2014 18:51, Luis Gomez <ecelgp@...> wrote:
|
|
Re: Project dependency question
George Zhao <George.Y.Zhao@...>
Thanks for the explanation.
BR, George
From: Wojciech Dec [mailto:wdec.ietf@...]
Hi, MD-SAL dependency is coming in from the AuthZ service piece, which hasn't been committed yet. Moreover the APIs generated by Yangtools depend on the MD-SAL broker components to get them to work. Regards, Wojciech.
On 10 August 2014 08:28, George Zhao <George.Y.Zhao@...> wrote:
Hello,
I saw on the spreadsheet, AAA has dependencies on Yangtools and MD-SAL, however, I can only see yangtools dependency through maven pom.xml, I wonder if someone can explain to me where is the MD-SAL dependency coming from?
Thanks,
George
|
|
Re: maven build fail for feature-aaa
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi Zhao,
This has been fixed a week or so ago… Please pull the latest and let me know if it is still broken for you.
Hmm.. wonder why Jenkins did not catch it… Will investigate….
Liem
From: aaa-dev-bounces@... [mailto:aaa-dev-bounces@...]
On Behalf Of George Zhao
Hi I don’t know if someone already filed a bug for this or not, when I tried to do a maven build from head, I got the following error.
It looks like something related to karaf.
[INFO] Reactor Summary: [INFO] [INFO] commons.aaa ....................................... SUCCESS [6.320s] [INFO] aaa.project ....................................... SUCCESS [0.236s] [INFO] aaa-authn-api ..................................... SUCCESS [6.825s] [INFO] aaa-authn ......................................... SUCCESS [4.338s] [INFO] aaa-authn-sts ..................................... SUCCESS [11.565s] [INFO] aaa-authn-store ................................... SUCCESS [7.415s] [INFO] aaa-authn-sssd .................................... SUCCESS [0.793s] [INFO] aaa-authn-keystone ................................ SUCCESS [1.109s] [INFO] aaa-idmlight ...................................... SUCCESS [0.946s] [INFO] aaa-authz ......................................... SUCCESS [0.101s] [INFO] aaa-authz-model ................................... SUCCESS [14.978s] [INFO] features-aaa ...................................... FAILURE [2.203s] [INFO] ------------------------------------------------------------------------ [INFO] BUILD FAILURE [INFO] ------------------------------------------------------------------------ [INFO] Total time: 1:02.122s [INFO] Finished at: Sat Aug 09 22:37:47 PDT 2014 [INFO] Final Memory: 52M/124M [INFO] ------------------------------------------------------------------------ [ERROR] Failed to execute goal org.apache.karaf.tooling:karaf-maven-plugin:3.0.1:features-create-kar (features-create-kar) on project features-aaa: Failed to create archive: Could not find artifact org.opendaylight.aaa:features-aaa:cfg:clients:0.1.0-SNAPSHOT in opendaylight-release (http://nexus.opendaylight.org/content/repositories/opendaylight.release/) [ERROR] [ERROR] Try downloading the file manually from the project website. [ERROR] [ERROR] Then, install it using the command: [ERROR] mvn install:install-file -DgroupId=org.opendaylight.aaa -DartifactId=features-aaa -Dversion=0.1.0-SNAPSHOT -Dclassifier=clients -Dpackaging=cfg -Dfile=/path/to/file [ERROR] [ERROR] Alternatively, if you host your own repository you can deploy the file there: [ERROR] mvn deploy:deploy-file -DgroupId=org.opendaylight.aaa -DartifactId=features-aaa -Dversion=0.1.0-SNAPSHOT -Dclassifier=clients -Dpackaging=cfg -Dfile=/path/to/file -Durl=[url] -DrepositoryId=[id] [ERROR] [ERROR] [ERROR] org.opendaylight.aaa:features-aaa:cfg:0.1.0-SNAPSHOT [ERROR]
|
|
AuthN and netconf-tcp, netconf-ssh
Ed Warnicke (eaw) <eaw@...>
Liem,
Robert is wanting to explore using AAA for netconf-tcp and netconf-ssh for Helium. As we’ve discussed, the need here is for netconf-{tcp,ssh} to be able to present credentials to authN, and find out if they are valid credentials. Hopefully this should be simple. Could you help Robert figure out the scope of the work? Ed
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi Robert,
toggle quoted messageShow quoted text
AAA comes a built-in IdM server with a set of REST API to manage users/roles/domains. You can use this API to validate credentials from your service, basically passing in username/password/domain and getting back a set of roles for that user on the given domain. You can then do further authorization if needed in your service. More details on the IdM APIs here (Sorry, we are working on getting more formal documentation than a spreadsheet): https://docs.google.com/spreadsheets/d/1YYMmK_V5LMAjLGZOEjfKSX0x4Gwb-K5Xuk1wZskwWwY/edit#gid=0 This work is not yet checked in, since we are still working on integrating it into Karaf (having issue with JAXB/JSON in Karaf)... Regards, Liem
-----Original Message-----
From: Ed Warnicke (eaw) [mailto:eaw@...] Sent: Tuesday, August 19, 2014 7:48 AM To: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@...; Nguyen, Liem Manh Subject: AuthN and netconf-tcp, netconf-ssh Liem, Robert is wanting to explore using AAA for netconf-tcp and netconf-ssh for Helium. As we've discussed, the need here is for netconf-{tcp,ssh} to be able to present credentials to authN, and find out if they are valid credentials. Hopefully this should be simple. Could you help Robert figure out the scope of the work? Ed
|
|
Documentation meeting for AAA
Nguyen, Liem Manh <liem_m_nguyen@...>
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Ed Warnicke (eaw) <eaw@...>
Liem,
toggle quoted messageShow quoted text
We would need a direct Java binding… do you have DOCs on how to do that? Ed
On Aug 19, 2014, at 1:51 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote:
Hi Robert,
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Nguyen, Liem Manh <liem_m_nguyen@...>
No, we don't have any formal doc on that yet (will be Javadoc as soon as we get the IdM server integrated); but, it will be part of the OSGi IdmService. I will provide more developer info as soon as this gets integrated (hopefully) this week.
toggle quoted messageShow quoted text
Regards, Liem
-----Original Message-----
From: Ed Warnicke (eaw) [mailto:eaw@...] Sent: Tuesday, August 19, 2014 12:24 PM To: Nguyen, Liem Manh Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: Re: AuthN and netconf-tcp, netconf-ssh Liem, We would need a direct Java binding... do you have DOCs on how to do that? Ed On Aug 19, 2014, at 1:51 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote: Hi Robert,
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi Robert,
While we are working on integrating the IdM server (almost there!), this is the service you can obtain from OSGi to do the authentication:
Currently, the only credential AAA supports out-of-the-box for direct authentication is username/password: PasswordCredentials.
Please let me know if you have any questions…
Regards, Liem
-----Original Message-----
From: Nguyen, Liem Manh Sent: Tuesday, August 19, 2014 12:50 PM To: 'Ed Warnicke (eaw)' Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: RE: AuthN and netconf-tcp, netconf-ssh
No, we don't have any formal doc on that yet (will be Javadoc as soon as we get the IdM server integrated); but, it will be part of the OSGi IdmService. I will provide more developer info as soon as this gets integrated (hopefully) this week.
Regards, Liem
-----Original Message----- From: Ed Warnicke (eaw) [mailto:eaw@...] Sent: Tuesday, August 19, 2014 12:24 PM To: Nguyen, Liem Manh Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: Re: AuthN and netconf-tcp, netconf-ssh
Liem, We would need a direct Java binding… do you have DOCs on how to do that?
Ed On Aug 19, 2014, at 1:51 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote:
> Hi Robert, > > AAA comes a built-in IdM server with a set of REST API to manage users/roles/domains. You can use this API to validate credentials from your service, basically passing in username/password/domain and getting back a set of roles for that user on the given domain. You can then do further authorization if needed in your service. > > More details on the IdM APIs here (Sorry, we are working on getting more formal documentation than a spreadsheet): > > https://docs.google.com/spreadsheets/d/1YYMmK_V5LMAjLGZOEjfKSX0x4Gwb-K5Xuk1wZskwWwY/edit#gid=0 > > This work is not yet checked in, since we are still working on integrating it into Karaf (having issue with JAXB/JSON in Karaf)... > > Regards, > Liem > > -----Original Message----- > From: Ed Warnicke (eaw) [mailto:eaw@...] > Sent: Tuesday, August 19, 2014 7:48 AM > To: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@...; Nguyen, Liem Manh > Subject: AuthN and netconf-tcp, netconf-ssh > > Liem, > Robert is wanting to explore using AAA for netconf-tcp and netconf-ssh for Helium. > As we've discussed, the need here is for netconf-{tcp,ssh} to be able to present credentials to authN, and find out if they are valid credentials. Hopefully this should be simple. Could you help Robert figure out the scope of the work? > > Ed
|
|
Installing AAA in Karaf...
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi guys,
Here are the steps I go through to get AAA installed on Karaf (the install stuff should go into the installation guide later, but at least just the contents for now):
1. Build the AAA code 2. Grab the controller code (git clone https://git.opendaylight.org/gerrit/p/controller.git) 3. Build it! 4. cd opendaylight/distribution/opendaylight-karaf/target/assembly 5. bin/karaf (you may need to chmod u+x it) 6. Add AAA repo (within karaf shell): repo-add mvn:org.opendaylight.aaa/features-aaa/0.1.0-SNAPSHOT/xml/features 7. List ODL features: feature:list | grep odl (you should see aaa in there as well). There are 4 aaa features: a. odl-aaa-authn (Authentication feature) b. odl-aaa-authn-sssd (Authentication with SSSD) c. odl-aaa-authz (Authorization feature) d. odl-aaa-all (AAA features—includes all the above) 8. You can then install any listed feature. Example: feature:install odl-aaa-authn 9. Sanity check to see if AAA is up: issue a token request: curl -si -d 'grant_type=password&username=admin&password=odl&scope=pepsi' http://localhost:8181/oauth2/token 10. If that above returns an error, something is wrong: check the log under opendaylight/distribution/opendaylight-karaf/target/assembly/data/log. You can also issue log:display in the Karaf shell and grep for stuff as well.
If you make your changes to your code, after rebuilding, you can refresh the repo in the Karaf shell by:
1. Feature:uninstall <your feature> 2. Repo-refresh 3. Feature:install <your feature>
There may be a better way to hot deploy your code, but I don’t know how to do it yet… If you do, please speak up J.
Other useful things I find in Karaf shell:
1. Web:list (show you all the web endpoints you have) 2. Feature:install webconsole (this installs the web console at http://localhost:8181/system/console/ username:karaf/password:karaf) This provides a great tool to see how things are wired, what services/bundles/features are available, configuration, etc… tons of stuff.
For checking in your code, this Wiki page is a good start: https://wiki.opendaylight.org/view/GettingStarted:Pulling,_Hacking,_and_Pushing_All_the_Code_from_the_CLI
After the setup as shown by the above wiki page, check-in process should be as simple as:
1. Git checkout –b <your topic branch name> 2. Git commit –a –s –m “comments for your checkin” 3. Git review 4. Go to Gerrit and invite at least 1 reviewer to review your code
Cheers, Liem
|
|
Re: Installing AAA in Karaf...
Nguyen, Liem Manh <liem_m_nguyen@...>
FYI…
>> There may be a better way to hot deploy your code, but I don’t know how to do it yet…
Bundle:watch <bundle id> will allow you to hot deploy your bundle when you build it.
Liem
From: Nguyen, Liem Manh
Hi guys,
Here are the steps I go through to get AAA installed on Karaf (the install stuff should go into the installation guide later, but at least just the contents for now):
1. Build the AAA code 2. Grab the controller code (git clone https://git.opendaylight.org/gerrit/p/controller.git) 3. Build it! 4. cd opendaylight/distribution/opendaylight-karaf/target/assembly 5. bin/karaf (you may need to chmod u+x it) 6. Add AAA repo (within karaf shell): repo-add mvn:org.opendaylight.aaa/features-aaa/0.1.0-SNAPSHOT/xml/features 7. List ODL features: feature:list | grep odl (you should see aaa in there as well). There are 4 aaa features: a. odl-aaa-authn (Authentication feature) b. odl-aaa-authn-sssd (Authentication with SSSD) c. odl-aaa-authz (Authorization feature) d. odl-aaa-all (AAA features—includes all the above) 8. You can then install any listed feature. Example: feature:install odl-aaa-authn 9. Sanity check to see if AAA is up: issue a token request: curl -si -d 'grant_type=password&username=admin&password=odl&scope=pepsi' http://localhost:8181/oauth2/token 10. If that above returns an error, something is wrong: check the log under opendaylight/distribution/opendaylight-karaf/target/assembly/data/log. You can also issue log:display in the Karaf shell and grep for stuff as well.
If you make your changes to your code, after rebuilding, you can refresh the repo in the Karaf shell by:
1. Feature:uninstall <your feature> 2. Repo-refresh 3. Feature:install <your feature>
There may be a better way to hot deploy your code, but I don’t know how to do it yet… If you do, please speak up J.
Other useful things I find in Karaf shell:
1. Web:list (show you all the web endpoints you have) 2. Feature:install webconsole (this installs the web console at http://localhost:8181/system/console/ username:karaf/password:karaf) This provides a great tool to see how things are wired, what services/bundles/features are available, configuration, etc… tons of stuff.
For checking in your code, this Wiki page is a good start: https://wiki.opendaylight.org/view/GettingStarted:Pulling,_Hacking,_and_Pushing_All_the_Code_from_the_CLI
After the setup as shown by the above wiki page, check-in process should be as simple as:
1. Git checkout –b <your topic branch name> 2. Git commit –a –s –m “comments for your checkin” 3. Git review 4. Go to Gerrit and invite at least 1 reviewer to review your code
Cheers, Liem
|
|
Question on Karaf pax-exam
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi Mathieu,
I found a linky on the Wiki for writing integration tests on Karaf:
I would like to use this for AAA… Do you have a working project/example that I can take a look at?
Thanks, Liem
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Robert Varga -X (rovarga - Pantheon Technologies SRO@Cisco) <rovarga@...>
Hey Liem,
This looks like an API Maros (CC’d) will need to migrate the NETCONF bits away from AD-SAL.
Thanks, Robert
From:
Nguyen, Liem Manh [mailto:liem_m_nguyen@...]
Hi Robert,
While we are working on integrating the IdM server (almost there!), this is the service you can obtain from OSGi to do the authentication:
Currently, the only credential AAA supports out-of-the-box for direct authentication is username/password: PasswordCredentials.
Please let me know if you have any questions…
Regards, Liem
-----Original Message-----
From: Nguyen, Liem Manh Sent: Tuesday, August 19, 2014 12:50 PM To: 'Ed Warnicke (eaw)' Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: RE: AuthN and netconf-tcp, netconf-ssh
No, we don't have any formal doc on that yet (will be Javadoc as soon as we get the IdM server integrated); but, it will be part of the OSGi IdmService. I will provide more developer info as soon as this gets integrated (hopefully) this week.
Regards, Liem
-----Original Message----- From: Ed Warnicke (eaw) [mailto:eaw@...] Sent: Tuesday, August 19, 2014 12:24 PM To: Nguyen, Liem Manh Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: Re: AuthN and netconf-tcp, netconf-ssh
Liem, We would need a direct Java binding… do you have DOCs on how to do that?
Ed On Aug 19, 2014, at 1:51 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote:
> Hi Robert, > > AAA comes a built-in IdM server with a set of REST API to manage users/roles/domains. You can use this API to validate credentials from your service, basically passing in username/password/domain and getting back a set of roles for that user on the given domain. You can then do further authorization if needed in your service. > > More details on the IdM APIs here (Sorry, we are working on getting more formal documentation than a spreadsheet): > > https://docs.google.com/spreadsheets/d/1YYMmK_V5LMAjLGZOEjfKSX0x4Gwb-K5Xuk1wZskwWwY/edit#gid=0 > > This work is not yet checked in, since we are still working on integrating it into Karaf (having issue with JAXB/JSON in Karaf)... > > Regards, > Liem > > -----Original Message----- > From: Ed Warnicke (eaw) [mailto:eaw@...] > Sent: Tuesday, August 19, 2014 7:48 AM > To: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@...; Nguyen, Liem Manh > Subject: AuthN and netconf-tcp, netconf-ssh > > Liem, > Robert is wanting to explore using AAA for netconf-tcp and netconf-ssh for Helium. > As we've discussed, the need here is for netconf-{tcp,ssh} to be able to present credentials to authN, and find out if they are valid credentials. Hopefully this should be simple. Could you help Robert figure out the scope of the work? > > Ed
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Nguyen, Liem Manh <liem_m_nguyen@...>
Hi Robert,
I am not sure I quite understand your comment about API macro, but the AuthN piece in AAA is designed to be independent of either AD-SAL or MD-SAL.
Regards, Liem
From: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco) [mailto:rovarga@...]
Hey Liem,
This looks like an API Maros (CC’d) will need to migrate the NETCONF bits away from AD-SAL.
Thanks, Robert
From: Nguyen, Liem Manh [mailto:liem_m_nguyen@...]
Hi Robert,
While we are working on integrating the IdM server (almost there!), this is the service you can obtain from OSGi to do the authentication:
Currently, the only credential AAA supports out-of-the-box for direct authentication is username/password: PasswordCredentials.
Please let me know if you have any questions…
Regards, Liem
-----Original Message-----
From: Nguyen, Liem Manh Sent: Tuesday, August 19, 2014 12:50 PM To: 'Ed Warnicke (eaw)' Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: RE: AuthN and netconf-tcp, netconf-ssh
No, we don't have any formal doc on that yet (will be Javadoc as soon as we get the IdM server integrated); but, it will be part of the OSGi IdmService. I will provide more developer info as soon as this gets integrated (hopefully) this week.
Regards, Liem
-----Original Message----- From: Ed Warnicke (eaw) [mailto:eaw@...] Sent: Tuesday, August 19, 2014 12:24 PM To: Nguyen, Liem Manh Cc: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@... Subject: Re: AuthN and netconf-tcp, netconf-ssh
Liem, We would need a direct Java binding… do you have DOCs on how to do that?
Ed On Aug 19, 2014, at 1:51 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote:
> Hi Robert, > > AAA comes a built-in IdM server with a set of REST API to manage users/roles/domains. You can use this API to validate credentials from your service, basically passing in username/password/domain and getting back a set of roles for that user on the given domain. You can then do further authorization if needed in your service. > > More details on the IdM APIs here (Sorry, we are working on getting more formal documentation than a spreadsheet): > > https://docs.google.com/spreadsheets/d/1YYMmK_V5LMAjLGZOEjfKSX0x4Gwb-K5Xuk1wZskwWwY/edit#gid=0 > > This work is not yet checked in, since we are still working on integrating it into Karaf (having issue with JAXB/JSON in Karaf)... > > Regards, > Liem > > -----Original Message----- > From: Ed Warnicke (eaw) [mailto:eaw@...] > Sent: Tuesday, August 19, 2014 7:48 AM > To: Robert Varga -X (rovarga - Pantheon Technologies SRO at Cisco); aaa-dev@...; Nguyen, Liem Manh > Subject: AuthN and netconf-tcp, netconf-ssh > > Liem, > Robert is wanting to explore using AAA for netconf-tcp and netconf-ssh for Helium. > As we've discussed, the need here is for netconf-{tcp,ssh} to be able to present credentials to authN, and find out if they are valid credentials. Hopefully this should be simple. Could you help Robert figure out the scope of the work? > > Ed
|
|
Re: AuthN and netconf-tcp, netconf-ssh
Ed Warnicke (eaw) <eaw@...>
Liem,
toggle quoted messageShow quoted text
Think of it this way:
We have a bundle. The bundle gets user credentials. It needs to via a java service ask the AuthN to whether
those credentials are valid or not (and what roles they correspond to).
How would we do that?
Ed On Aug 22, 2014, at 3:44 PM, Nguyen, Liem Manh <liem_m_nguyen@...> wrote:
|
|