-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create security model for torque-sites #62
Comments
I believe the new "LFC Research Partner" group (see, e.g., commit 6859c64) will need to map to a top-level "Research Partners" access category, one not contemplated in our 2020-03-17 meeting. (It's not so surprising that we wouldn't have thought of everything in the initial meeting. Probably there will be some other generic access groups that we need to add later too.) |
As promised in today's meeting with LFC, create a canonical place where we will maintain documentation for the access groups.
PR #73 is related to this issue. |
…hz-groups Document the shared authz groups (issue #62)
Slight change to this issue, instead of disabling sysop/bureaucrat/interface-admin, we've made the decision to map incoming users to those groups directly. This is more future proof than attempting to duplicate the permissions into a newly created group. |
Clean it up so things are a bit more declarative, as well as moving the simpelsaml group config code over to the permissions, so that the separation of concerns is a bit more straightforward. Issue #62: Create security model for torque-sites Issue #64: Pluralize the names of the abstract user groups
Right now each site is haphazardly doing secure things based on however that was configured at startup. This needs to be formalized and organized.
We need to create a list of groups that users must go into, and then disable permissions for the standard mediawiki groups (user, bureaucrat, *, sysop, etc). Then we need to enable some permissions for the groups we set up, and make sure that all users are getting assigned at least one of them. We may want to keep
user
around in order to get some base permissions in case someone is not assigned a group by the admins.The groups we want to set up include things like DecisionMaker (such as donors), Admins (LFC Staff, OTS Staff), PseudoDecisionMaker (liaisons to donors), etc. See https://github.com/OpenTechStrategies/torque/wiki/Meeting-Notes#2020-03-17-frankkarl-discussion-re-eo-and-usergroup-permissions for more information.
Then these need to be placed in their own files instead of just hacked into LocalSettings by ansible, so that we get better source control on them. They should also be centralized a la #53
The text was updated successfully, but these errors were encountered: