I have read the oVirt security model, I think basically, for
      virtualization management, it can be applied to Kimchi.
      I think Kimchi's security model can be created with some
      customization of oVirt's security model.
      
      I recommend 3 levels of administration below:
      
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Administration_Guide/Administration_Guide-Managing_User_Access.html
      1. console admin -- handle kimchi administration, host level
      physical resources management.
      2. resource admin -- OOTB roles with permission combined with
      resource type, like VMAdmin, StorageAdmin, NetworkAdmin...
              this type of users are responsible to construct
      environment for a certain task.
              their authorizations can be easily constructed with
      combination with OOTB roles, then they can start to create
      resources needed.
              I think it will be needed if we can set some limit on
      resource usages like max cpu, memory, bandwidth.
      
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Virtualization/3.0/html/Administration_Guide/Virtual_Roles.html
      3. resource user    -- at this level, I tend to think that no OOTB
      roles are needed as fine granularity of authorization will be
      needed.
              the authorization at this level are at a resource basis,
      need to assign permissions for each user on each resource.
              one thing to emphasize is that, resource user does not
      mean the user can only use(start/stop/vnc) the resource, 
              it depends on concrete case, they can be assigned with
      permission to update/delete resources.
      
      I think this is a flexible and efficient authority delegation
      model with responsibilities balanced.
      
      
      On 1/15/2014 3:03 PM, Shu Ming wrote: