1

Consider a scenario in which you offer service access based on a hierarchy of authority. i.e., a HEAD can register his subordinates. The authenticated HEAD has the previledge to read and update data from all of his subordinates. Is there an authorization standard or pattern that relates to this scenario?

Different roles may be assigned to the HEAD and subordinates, and they could be distinguished with scopes in standard OIDC. With this, we can ensure that only users with specific roles have access to certain APIs and properties. But, even with the aforementioned, how can we prevent privilege escalation? i.e. Prevent a given HEAD from querying other HEADs' subordinates?

One option that springs to me is embedding the subordinate IDs within the JWT Token itself. However, I do not believe that this solution will be scalable or generic enough. i.e. if a co-HEAD is introduced and the subordinates are large in number? It also requires granular code level (Microservices level) validations, which cannot be performed at the gateway, making the system fragile.

Are there any generic, scalable patterns to handle this, ideally any standards that Identity Providers can easily support?

Fahim Farook
  • 121
  • 4
  • What happens to access controls when heads move across organizations? – Limit Aug 30 '21 at 02:00
  • These kind of AuthZ systems work well when an organization has a well defined structure. For organizations that are dynamic, it will be _really_ hard to build something generic. – Limit Aug 30 '21 at 02:10

0 Answers0