Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security considerations #1638

Open
petrovicboban opened this issue Oct 25, 2017 · 1 comment
Open

Security considerations #1638

petrovicboban opened this issue Oct 25, 2017 · 1 comment

Comments

@petrovicboban
Copy link

As it is, anyone who has access to singularity, can deploy anything to be executed as root user. Basically, this is almost the same as they have ssh access to root account. Singularity does not have any concept of user/groups authentication and authorization.
How to allow certain teams or team members to deploy jobs to singularity, but with some constraints? For example, task can be executed only as a user from specific list. Or command can not match some regex. That's all use cases of importance if you have multiple teams with clearly defined privileges. Right now, singularity makes those privilege separation completely useless.

@ssalinas
Copy link
Member

Singularity already has a concept of authorization, however it is not well exposed or easy to use as of yet. Currently, there is an ldap-backed authorization method you can use. The user in question is passed in as a header, and the groups for that user compared against the group/readWriteGroups/readOnlyGroups for the request they are trying to access. There isn't any authentication in Singularity yet however.

We are already working on #1635 which adds a more flexible way to set this up and provide user details to Singularity. With that PR I plan on adding documentation on how to set it up and take advantage of these features

@ssalinas ssalinas mentioned this issue Nov 3, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants