I have read the oVirt security model, I think basically, for
virtualization management, it can be applied to Kimchi.
I think Kimchi's security model can be created with some
customization of oVirt's security model.
I recommend 3 levels of administration below:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Administration_Guide/Administration_Guide-Managing_User_Access.html
1. console admin -- handle kimchi administration, host level
physical resources management.
2. resource admin -- OOTB roles with permission combined with
resource type, like VMAdmin, StorageAdmin, NetworkAdmin...
this type of users are responsible to construct
environment for a certain task.
their authorizations can be easily constructed with
combination with OOTB roles, then they can start to create
resources needed.
I think it will be needed if we can set some limit on
resource usages like max cpu, memory, bandwidth.
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Administration_Guide/Virtual_Roles.html
3. resource user -- at this level, I tend to think that no OOTB
roles are needed as fine granularity of authorization will be
needed.
the authorization at this level are at a resource basis,
need to assign permissions for each user on each resource.
one thing to emphasize is that, resource user does not
mean the user can only use(start/stop/vnc) the resource,
it depends on concrete case, they can be assigned with
permission to update/delete resources.
I think this is a flexible and efficient authority delegation
model with responsibilities balanced.
On 1/15/2014 3:03 PM, Shu Ming wrote: