-
In the TSC meeting yesterday Casey @cawilson1 brought up security, I think I thought of a way to add some sound defaults in core. core should include a user object, which contains a ‘sub’ property and we can include a’scope’ property, the scope property per action should contain one of the following, for example on the data create doc endpoint
if the scope contains one of the values then the op is allowed otherwise it is rejected —- If this works I think it opens the door to creating a token endpoint that can be used to generate tokens for hyper63 this way we can safely leverage the hcma secret pattern, I will post more thoughts about this on another thread. —- Basically in core we can implement checks for these basic scopes, then the implementation team can manage token generation around these scopes as far as tenants that is an upstream details |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
I like the idea of hyper63 having some security configs and frameworks that can at least be opted in for. While it is true that often bigger orgs might have strict security guidelines and opinions that might make them unlikely to use hyper63's security services, I think for small and medium orgs, a more likely problem may be that people just don't know security best practices. On top of that, understanding these best practices may take significant domain-specific knowledge that is not of interest/use to a developer interested in getting something out and keeping it running. I think adding some optional security management features could add a lot of value to hyper63. Keeping up with security best practice is as exhausting, and probably less fun/interesting for most devs than new tools/frameworks. !!!Good!!! out-of-the-box security solutions are both more secure and less time-consuming than custom implementations. Main potential downside: security best practices fall on maintainers of hyper63. Still, I don't think this would be too much of an issue if some reasonable best practices are used, and opt-ins for outsourcing security to services that specialize in it are available. |
Beta Was this translation helpful? Give feedback.
-
I think we should hold off on this request until we have a better example of the need here and the problem it solves. |
Beta Was this translation helpful? Give feedback.
I think we should hold off on this request until we have a better example of the need here and the problem it solves.