Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Doc] Add workspace access control design proposal #4633

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
216 changes: 216 additions & 0 deletions docs/saved_objects/saved_object_access_control_design_proposal.md
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 Thanks for making this a pull request, much easier to put inline feedback on the design and for follow up.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's be thoughtful about communicating this features status in the security review process [1] since this feature security focused. There is a balance when communicating details, but as contributions to this feature will have impact on the security posture and the review process we should be prepared to handle those.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Speaking of security reviews, I recommend starting the internal security review process early as this features complexity and risk potential is likely to require more lead time and time consuming activities.

Original file line number Diff line number Diff line change
@@ -0,0 +1,216 @@
# Proposed Saved Object Access Control with Workspaces

## Introduction
Issue #4615 proposed the "workspace" experience for users to organize their work within OpenSearch Dashboards. It described the experience for users to manages the permissions to access the saved objects they own. Based on the workspace experience proposal, we proposes this saved objects access control design in this document.

### Problem with current implementation

As of v2.7, OpenSearch Dashboards supports [multi-tenancy feature](https://opensearch.org/docs/latest/security/multi-tenancy/tenant-index/) for saved objects access conrol. The existing implementation closely couple OpenSearch Dashboards with one single OpenSearch cluster, which acts as the OpenSearch Dashboards data store as well as identity source. While the tenancy feature for OpenSearch Dashboards data access control is a coarse-grained model, one user will have access to all object in a tenant, or they have no access to any object in a teannt. It also requires administrators to centrally manage the user access to any tenant, and barely support saved objects sharing.

This document discusses the proposed data access control for OpenSearch Dashboards, which is independent from the *multi-tenancy* feature provided by the security plugin.

Glossary

* **Saved object**: Any data that is managed by OpenSearch Dashboards are called saved objects, such as index patterns, visualization and dashboard definition. In a common setup, each saved object is a document stored in `.opensearch_dashboards` index. In some context, it is also called library items, in #4615
* **Workspace**: a logical container of OpenSearch Dashboards features and saved objects

## Assumptions & Scopes

* Authentication is out of the scope. We can assume the users are authenticated and user profile (user name and group info) has been injected into each request
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While authentication is not in scope for this design - but there are plans to decouple authentication, lets add requirements on the current AuthN system expectations.

We've found internal features in the security plugin were actually being used as if they were part of a public interface, since this design depends on the security plugin accounting for these areas and making hard requirements will ensure no breaking changes and make migrating to the end-state Trinity authentication system more preditable.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We've found internal features in the security plugin were actually being used as if they were part of a public interface

Could you share the example? Just want to make sure our implementation doesn't rely on security plugin internals, though I believe we're only using publicly accessible APIs.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lets add requirements on the current AuthN system expectations.

What's only required is just as it describes: user profile (user name and group info) has been injected into each request.

* Feature (API) access control is out of scope
* Data (saved objects) access control is in scope

## Design
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be helpful to weight the recommended design against other approach(es), I see that this has been accounted for inline for key features and if there was a wholistic case made for another approach it would help illustrate the tradeoffs and benefits of your recommendation.


### Personas
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These personas are defined by their level of access to the system, not by their goals. I'd recommend abstracting what/how of permissions in favor of what the personas are trying to accomplish within a workspace.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've pondered my feedback and here's why focusing on user goals matters. If we rely heavily on pre-existing permission structures, our solution's scope might be unintentionally limited.

Starting from scratch for workspaces lets us independently define requirements, leading to a flexible and efficient system tailored to users' needs. We should strive to understand user needs and goals, and not be overly bound by existing permission systems.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure if I fully get what you recommended, I'll try to reply based on my understanding.

If we rely heavily on pre-existing permission structures, our solution's scope might be unintentionally limited.

If the pre-existing permission structures you're referring is the personas defined here, I think our implementation won't rely on that.

For a workspace, we abstracted 4 types of permission:

  1. write, user can write(include delete) to the workspace object as well as the ACL defined on the the object
  2. read, user can read the workspace object
  3. library_write, user can create/update objects, such as dashboards, visualizations associated with the workspace
  4. library_write, can can read objects, such as dashboards, visualizations associated with the workspace

A workspace admin is write + library_write
A workspace operator is read + library_write
A workspace viewer is read + library_read

Does this address your concern?


There are following personas in *Workspace* use cases:
* **Super admin**: the administrator of the OpenSearch Dashboards, who has complete access to all functions and data of OpenSearch Dashboards.
* **Workspace admin**: Workspace admin have complete access to workspace configurations and saved objects in the workspace. Workspace creator will become the workspace admin when a workspace is created. Workspace admin most time can be used exchangeably with and workspace owner. Workspace admin
* **Workspace operator**: workspace operator has permission to view, create and update saved objects in the workspace.
* **Workspace viewer**: workspace operator only has permission to view the saved objects in the workspace

Please note that, the workspace admin, operator and viewer persona are specific to the workspace. e.g. one workspace operator in one workspace can be an admin in another workspace.

super-admin is a stack level role, it can be configured in the `opensearch_dashboards.yml` config file.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Down a couple of paragraphs you mention not using RBAC, maybe this belongs elsewhere or incorporated in another way?

Who a super-admin is seems like something that shouldn't be statically defined as such I don't think a config file that requires a restart of the service to pick up is a good place to manage this informatino. Maybe breakout another doc/section for how to address items like this.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This part needs to update because super-admin can not only be configured statically in opensearch_dashboards.yml, but also can be configured via dynamic application configuration: #5855


### Discretionary Access Control for Data Access Control

In order to support allowing a resource owner to manage the access to the resource feature, we can employ discretionary access control model. The idea is that, for each OpenSearch Dashboards saved object, we can attach an ACL (access control list) to it to save the principals and permission to operate that saved object. When a user is attempting to perform any operation on that saved object, we will first of all evaluate the ACL and then allow or deny the operation accordingly.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add a diagram to help illustrate the relationship, here is a diagram along with the code to add it inline. BTW If I got this relationship wrong please update :D

BTW I asked ChatGPT to generate an outline for this diagram if you want to streamline their creation

graph LR
    subgraph Dashboard
        DashboardObject["Dashboard Object"]
    end

    subgraph ACL1
        ACL11["Access Control List Entry"]
        ACL12["Access Control List Entry"]
    end

    subgraph ACL2
        ACL21["Access Control List Entry"]
    end

    DashboardObject --> |Associated with| ACL1
    DashboardObject --> |Associated with| ACL2

    style DashboardObject fill:#FFE4B5,stroke:#333,stroke-width:2px
    style ACL1 fill:#ADD8E6,stroke:#333,stroke-width:2px
    style ACL2 fill:#ADD8E6,stroke:#333,stroke-width:2px
Loading
Suggested change
```mermaid
graph LR
subgraph Dashboard
DashboardObject["Dashboard Object"]
end
subgraph ACL1
ACL11["Access Control List Entry"]
ACL12["Access Control List Entry"]
end
subgraph ACL2
ACL21["Access Control List Entry"]
end
DashboardObject --> |Associated with| ACL1
DashboardObject --> |Associated with| ACL2
style DashboardObject fill:#FFE4B5,stroke:#333,stroke-width:2px
style ACL1 fill:#ADD8E6,stroke:#333,stroke-width:2px
style ACL2 fill:#ADD8E6,stroke:#333,stroke-width:2px

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1, but perhaps an even higher level one that has both workspaces and objects and how the overlapping permissions work

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one that has both workspaces and objects and how the overlapping permissions work

@davidlago The current implementation is it should either pass the permission check of workspace or the object's ACL validation

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@peternied We store the ACL data as part of the object(as a property), not with a separate object.

#### Why not using role based access control model
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think 'roles' are a fundamental problem, I think the problem is calculating what permissions a user has, with the current system there are no APIs do to this making the only avenue to attempt to perform an action and check for 403 (bad user experience).

Might want to leave the door open in the design to allow permissions to be source from other logical groups such as roles that might be useful in the future for larger numbers of workspace users.

IMO I think this problem is mitigated if you could see a projection of an individual's users permissions, e.g. potential way to see permissions where you can get a full list, and that list has references to the source of the permission:

GET /user/{USER_ID}/_permissions
{
  "user": "{USER_ID}",
  "permissions": [
    {
      "name": "WORKSPACE.VIEW",
      "scope": "*",
      "from": {
        "source": "role",
        "roleName": "AllUsers",
        "ref": "/roles/AllUsers"
      }
    },
    {
      "name": "WORKSPACE.EDIT",
      "scope": "index",
      "from": {
        "source": "user",
        "ref": "/user/{USER_ID}"
      }
    }
  ]
}


In existing OpenSearch products, all access control follows role/attributes based access control model, where a user can have several roles, while each role has corresponding permissions. The issue with the role based access control model is that, it requires administrator to centrally manage all access policies, which defines what principals can perform what actions on what resources. With admin managed access policies, OpenSearch Dashboards users cannot grant other users permissions to access specific resources, nor can they add other users to new workspaces. Creating workspaces and managing user access to workspaces will become admin responsibility, which isn't a simple collaboration experience.

### Workspace and Saved Objects

Workspace is a newly introduced type of OpenSearch Dashboards data, it is a container which organize the functions and saved objects, so the saved object in a workspace inherit the permissions settings from the workspace. One saved object can potentially in multiple workspaces, thus it inherits the permission settings from all the workspaces it is assigned to.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When you say inside, that seems more like a logical reference to 'associated with'. I'm concerned about inheritance when there could be multiple workspace with conflicting rules. As there are difference kinds of access read vs readwrite, if so this could make associating a saved object with multiple works spaces cause trouble - which permission do you get the lowest vs highest?

This inheritance creates side effects where modifying a workspace permission can change the permissions on objects inside other workspaces

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This phrase is missing a key verb:

One saved object can potentially in multiple workspaces

can be in? can be referenced in?

I echo @peternied's sentiments about the undesired side effects. Will saved objects be addressable outside of a workspace, or will they always be nested inside of a workspace? i.e. if object1 is associated with workspace1 and workspace2, can I link to object1 directly, or do I need to qualify with workspace1/object1? If so, could we skip the "it inherits all permissions across workspaces" so that it only gets those in the context it is being referenced?


#### Permissions

Based on the proposed workspace experience, an user may have following type of permissions on OpenSearch Dashboards data:

* read
* write (read_and_write)
* the write permission means the user update the saved object, and can add this saved object to another workspace, or update the ACL of the object so that the object can be shared to others

For workspaces, a user may have following 3 type of permissions:

* management
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@zengyan-amazon It seems management is not necessary in practice, it's basically write + library_write, the library_write give the user full access to all the saved objects associated with the workspace. The write permission will give a user full access to a workspace object includes the ACLs on the object. To my understanding, this equals to management, am I right?

* library_read
* library_write (library_read_and_write)

the management permission allows the principal to update the workspace settings, like enabling or disabling features in the workspace, as well as updating the ACLs for the workspace, such as granting permissions of other principals to access this workspace. *library_read* and *library_write* permission will be used to control the user/group permissions on the saved objects in the workspace.

With this permission definition

* a user is the workspace admin if they have management permission of the workspace
* a user can access/use a workspace if they have either library_read, or library_write permission or management permission of the workspace
* a user can view a saved object if
* they have read or write permission of the saved object, or
* they have library_read or library_write or admin permission of one of the workspace that saved object is associated to.
* a user can edit a saved object if
* they have write permission of the saved object, or
* they have library_write or admin permission of one of the workspace that saved object is associated to
* a user can create saved object in a workspace if they have library_write permission of the workspace


#### ACL
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While named differently, these ACLs look like roles, how are they different?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As both of them are mechanisms used in access control systems, they do share similarities, but they operate at different level.

ACLs focus on defining permissions at the object level for individual resources, roles abstract away permissions into named collections that can be assigned to users or groups based on their roles.

Does this answer your question?


The ACLs can be represented as following:

```
{
"permissions": {
"<permission_type_1>": [
"<principal_1>",
"<principal_2>"
],
"<permission_type_2>": [
"<principal_3>",
"<principal_4>"
],
}
}
```

We can also allow wildcard `*` to indicate any authenticated identity in the ACL.

For example, if we want to allow finance_manager group to manage the workspace, and allow *finance_analyst* groups to build dashboards in the workspace, the workspace ACLs may look like:

```
{
"permissions": {
"management": [
"group/finance_manager"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a system that will translate this into a principal/set of principals? Or is this assumed to be a principal part of the AuthN system?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As state at the beginning:

We can assume the users are authenticated and user profile (user name and group info) has been injected into each request

It expects AuthN system to inject these information

],
"library_write": [
"group/finance_analyst"
],
}
}
```

While if we want to allow user-1 to modify a saved object, and one can only view a saved object, the ACL of that common saved object will look like:

```
{
"permissions": {
"read": [
"*"
],
"library_write": [
"user/user-1"
],
}
}
```


ACLs can be considered as sub-resource or attributes of a OpenSearch Dashboards data record, so users who have the write permission to the data record can modify the ACL.

**Orphan objects**
This means a user can remove themselves from the ACL of a saved object. Once a user self-remove from a saved object’s ACL, other user having write permission can add the user back if needed. We can add additional checks to make sure any saved object will at least have some identities in the ACL to avoid orphan objects. However, in the case that the only owner of the object get removed from the user directory, which caused the objects becoming orphan, we will need super-admin to get involved to deal with the orphan data records.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Requiring the intervention of a super-admin for orphaned objects seems like its going to cause maintenance/operation issues, can we alter the design to handle/avoid these scenarios?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Objects not associate with workspace and do not have ACL defined, such objects can be considered "public", I think such objects won't require permission check. These saved objects behave like they are nowadays.




#### Initial ACLs of OpenSearch Dashboards data

Each OpenSearch Dashboards data record will have an initial default ACL when it is created.

When a workspace is created, the creator will by default have the management permission of that workspace. Then the creator can grant other users permissions to manage and perform operations in the workspace.

And when a saved object (ie. visualization) is created

* If there is a context workspace, the saved object will by default be associated to the context workspace and doesn’t have its specific ACL.
* If there is no context workspace (Do we support this use case?), the creator will by default have the write permission of that object, so that they can add the saved object to a workspace and grant other users permissions to access this saved object.

#### Access privilege evaluation

In the existing implementation, both Dashboards server and customer can modify the saved objects. e.g., Dashboards server manages the metadata index mapping, and handles index migration etc. While on the other hand, OpenSearch Dashboards uses user identities to perform CRUD operations on the visualization objects (index-patterns, visualizations, dashboards etc.), because OpenSearch Dashboards doesn’t have authN and authZ capabilities, it needs to rely on the backend OpenSearch to perform the authZ even for OpenSearch Dashboards data. With this native access control implementation in OpenSearch Dashboards, we will be able to have the authZ performed within OpenSearch Dashboards server, then access the OpenSearch Dashboards metadata store using OpenSearch Dashboards server identity, thus unified the OpenSearch Dashboards data handling.

OpenSearch Dashboards uses the [saved objects APIs](https://github.com/opensearch-project/OpenSearch-Dashboards/tree/main/src/core/server/saved_objects/routes) to perform CRUD operations against saved objects. And in order to apply the access control to the OpenSearch Dashboards data, we can implement a privilege evaluator component and embed it into the saved object database operations to enforce that users can only operate the data they have access to.

For single and bulk CRUD operations, the operations are performed by saved object ids, thus OpenSearch Dashboards can fetch the saved object ACLs by the saved object id and evaluate the user permission before sending the response back to client side. For common saved objects, the privilege evaluator will evaluate the ACLs of the saved object itself and the ACLs of the workspaces that object is associated to to determine if that operation should be allowed or denied. While for workspaces, it only needs to evaluate the ACL of that workspace itself.

For the [find](https://github.com/opensearch-project/OpenSearch-Dashboards/blob/main/src/core/server/saved_objects/routes/find.ts) API which lists the saved objects based on different search conditions, we will need to construct a search filter that can be applied to the query when performing searches against database.

OpenSearch Dashboards provided a couple approaches to intercept saved objects operations, such as using [ClientWrapper](https://github.com/opensearch-project/OpenSearch-Dashboards/blob/main/src/core/server/saved_objects/service/lib/scoped_client_provider.ts#L74) and [SavedObjectsClientFactory](https://github.com/opensearch-project/OpenSearch-Dashboards/blob/main/src/core/server/saved_objects/service/lib/scoped_client_provider.ts#L82) . We can leverage these interception mechanisms to simplify the privilege evaluation implementation.


#### Where to store ACLs

The ACL is a logically a sub-resource/attribute that is attached to OpenSearch Dashboards resources, and the same access control mechanism should apply to the ACL as the saved object it attaches to. We can either embed the ACL as attribute to the saved object, or store it separately as the standalone record, depending on what database is used by OpenSearch Dashboards. e.g. in the case of using NoSQL database as OpenSearch Dashboards metadata store, such as using OpenSearch index, embed the ACL into the saved object document as an attribute can simplify the privilege evaluation. while if using relational DB as OpenSearch Dashboards metadata store, storing ACLs as separate data records will be simpler.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If a user can 'write' to an object, it seems like they can alter its ACLs, this seems like a way to circumvent the permissions? Seems like the ACL associate needs to be protected from this level of access - otherwise anyone with a write allowed connection string is effectively a workspace super admin

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

anyone with a write allowed connection string is effectively a workspace super admin

Yes, this is the current design. We only have read and write, and write permission is currently the highest privilege, with write permission, a user can delete the object.

I understand the permission model can go deeper and more complex, but we started with a simple one which serves our current use-cases and the upcoming use-cases which is under design. We try to avoid over design, you could see this as a trade-off(which is a practical choice I think ;))


### Sharing with saved object hierarchy

There are generally 3 ways to share saved objects in this design

* Grant principals permissions to access workspace
* Only workspace admin can perform this operation
* Add saved objects to another workspace
* the user needs to have write permission in both source and destination workspaces
* Grant principals permissions to access specific saved objects
* the user needs to have write permission to the saved objects they want to share

If a user only have read permission on the objects, they will be able to copy the object to an workspace they have access to. But this is not a typical “sharing”, as they make new object instances instead of really sharing the original objects.

Given OpenSearch Dashboards saved objects has dependency hierarchy, such as dashboard depends on visualizations, and visualization in tern depends on index pattern. In any of the sharing cases, if a saved objects is shared, all its direct and transitive dependencies will also be shared. For example, if a dashboard is shared, then all the visualizations, index patterns that are used in the dashboard will be shared.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's clear that saved object inherit the permissions from the workspace, but if I attach ACL to a dashboard object, should visualizations and index patterns inherit dashboard object's ACL? Or the same ACL should attached to all visualization and index pattern objects specifically?


On the other hand, similarly, when removing data access to a saved object, we will need to check if this object is being referenced by another saved object, and where removing user permission on saved object can cause broken reference in the saved object hierarchy. If so, we will need to let the user to confirm if they want to force updating the permission.


### Role based feature/API access control

We can still use role based access control (RBAC) model for OpenSearch Dashboards feature/API access control, in addition to the ACL-based data access control. OpenSearch Dashboards admin can configure the feature access policy to control user access to certain OpenSearch Dashboards APIs. e.g. if we only want to allow a certain user group to create workspaces, we can implement such RBAC policy and enforcement to only allow create workspace API (essentially create saved object API where the object type is workspace) to be called by specified user groups.

And similarly we can apply the same API access control to other APIs such as alerting/ISM APIs etc. We will need to define actions for each API we want to add access control, and implement policy enforcement logic for those APIs (e.g. as API interceptors).

The role based feature access control is not conflict with the ACL-based saved object access control. We can add the feature access control when there is a need to manage user access to OpenSearch Dashboards APIs without impacting the saved object access.


## Appendix

### User private saved objects and app owned saved objects support

We may want to support user private saved objects in OpenSearch Dashboards, e.g. a user can have user level preferences such as light/dark theme, default search result size etc. And we may also support user level data source credentials in the future. This made user level private data a special type of saved objects, thus its access control will be different from common saved objects. User private data can only be read and written by the user.

We can still apply the same high level approach to the user private data records. The ACL attached to the user private data only allows the user’s own principal to access the data. While in the privilege evaluations component, we will need to enforce the user private data ACL cannot be modified by anyone.

Similar to user private saved objects, there are some type of saved objects are owned by the OpenSearch Dashboards application, such as telemetry data records. Those data are generated by OpenSearch Dashboards application and should not be available to common users. The ACL of those data should be set to only allow admin to access.

### What are the impacts to plugins

OpenSearch Dashboards provides a flexible plugin frameworks, and pretty much all functions in OpenSearch Dashboards are implemented as plugins. e.g. home page is a plugin, visualizations and dashboards are plugins, we also have other plugins outside of OpenSearch Dashboards repo, such as observability.

This saved object access control doesn’t impact the OpenSearch Dashboards plugins which do not store saved objects in OpenSearch Dashboards metadata store. While for the plugins that are saving saved objects in OpenSearch Dashboards metadata store, we would expect all the access to save objects are performed by calling SavedObjectClient APIs thus all the user access to saved objects are evaluated by the privilege evaluator.

The privilege evaluation logic are implemented in the database access layer, thus there won’t be SavedObjectClient interface changes. So we there won’t be code change campaigns for plugins to accommodate the new OpenSearch Dashboards data access control.

### Do we support anonymous users?

We can support anonymous user access. Anonymous user is a special identity which has a preserved user name in the system. that identity can be added into the ACL so that anonymous users will have certain permissions to the saved objects depending on the ACLs.

### Is there any scaling issue of ACL-based access control?

The ACL is attached to the data records. We will usually expect a few users/groups in the ACL, so the total user count should not be a scaling challenge
Copy link
Member

@kavilla kavilla Sep 26, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

comment here related to scaling: #5084 (review)

Loading