[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1496684.1496701guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Authorisation and delegation in the machination configuration system

Published: 09 November 2008 Publication History

Abstract

Experience with a crudely delegated user interface to our internally developed configuration management system convinced us that delegated access to configuration systems was worth pursuing properly. This paper outlines our approach to authorising access both to individual aspects of configurations and to collections of configurations. We advocate the use of authorisation of some kind on configuration changes and we believe that the system of authorising primitive manipulations of a configuration representation outlined herein could be accommodated by a number of existing configuration systems. The authorisation system described is still experimental and we regret that real world experience of the system in use with end users is not yet available.

References

[1]
Anderson, Paul, A Declarative Approach to the Specification of Large-Scale System Configurations, 2001, http://www.dcs.ed.ac.uk/~paul/publications/ conflang.pdf.
[2]
Anderson, Paul, George Beckett, Kostas Kavoussanakis, Guillaume Mecheneau, Jim Paterson, and Peter Toft, Gridweaver Project Report D3.1: Large- Scale System Configuration with lcfg and smartfrog, 2003, http://www.gridweaver.org/WP3/ report3_1. pdf.
[3]
Anderson, Paul, and Alva Couch, LISA 2004 invited talk: What is This Thing Called System Configuration? , 2004, http://www.usenix.org/publications/ library/proceedings/lisa04/tech/talks/ couch.pdf.
[4]
Anderson, Paul and Alastair Scobie, "LCFG: The Next Generation," UKUUG Winter Conference, UKUUG, 2002, http://www.lcfg.org/doc/ ukuug2002.pdf.
[5]
bcfg2 Documentation: Writing Specifications, http:// trac.mcs.anl.gov/projects/bcfg2/wiki/Writing Specification.
[6]
bcfg2 Home Page, http://trac.mcs.anl.gov/projects/ bcfg2.
[7]
cfengine Home Page, http://www.cfengine.org/.
[8]
Couch, Alva, "From x=1 to (setf x 1): What Does Configuration Management Mean?" USENIX ;login:, Vol. 33, Num. 1, pp. 12-18, 2008.
[9]
Delaet, Thomas and Wouter Joosen, "Podim: A Language for High-Level Configuration Management," Proceedings of the 21st Large Installation System Administration Conference (LISA '07), pp. 261-273, 2007.
[10]
Iseminger, David, Active Directory Services for Microsoft Windows 2000 Technical Reference, pp. 28, 45, Microsoft Press, 2000.
[11]
Machination Home Page, http://www.see.ed.ac.uk/ machination.
[12]
Active Directory Home Page, http://www.microsoft. com/windowsserver2003/technologies/directory/ activedirectory/default.mspx.
[13]
Microsoft Systems Management Server Home Page, http://www.microsoft.com/smserver/default.mspx.
[14]
Reductive Labs Puppet Project Page, http:// reductivelabs.com/projects/puppet/.
[15]
LCFG Home Page, http://www.lcfg.org.

Cited By

View all
  • (2010)Authorizing and directing configuration updates in contemporary it infrastructuresProceedings of the 3rd ACM workshop on Assurable and usable security configuration10.1145/1866898.1866912(79-82)Online publication date: 4-Oct-2010
  • (2009)Federated access control and workflow enforcement in systems configurationProceedings of the 23rd conference on Large installation system administration10.5555/1855698.1855708(10-10)Online publication date: 1-Nov-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
LISA'08: Proceedings of the 22nd conference on Large installation system administration conference
November 2008
199 pages

Sponsors

  • SAGE
  • USENIX Assoc: USENIX Assoc

Publisher

USENIX Association

United States

Publication History

Published: 09 November 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2010)Authorizing and directing configuration updates in contemporary it infrastructuresProceedings of the 3rd ACM workshop on Assurable and usable security configuration10.1145/1866898.1866912(79-82)Online publication date: 4-Oct-2010
  • (2009)Federated access control and workflow enforcement in systems configurationProceedings of the 23rd conference on Large installation system administration10.5555/1855698.1855708(10-10)Online publication date: 1-Nov-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media