Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The JS7 - Security Architecture includes the use of JS7 - Identity Services for JS7 - Authentication and JS7 - Authorization.

  • Identity Services implement authentication methods and access to Identity Providers. For example, for example credentials such as user account/password are can be used as an authentication method to access an LDAP Directory Service as the Identity Provider.
  • The JS7 supports a number of Identity Services:
    • Build-in Identity Services
      • Display feature availability
        StartingFromRelease2.2.0
         
        • JS7 - JOC Identity Service, see 
          Jira
          serverSOS JIRA
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1148
        • JS7 - LDAP Identity Service, see 
          Jira
          serverSOS JIRA
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1147
      • Display feature availability
        StartingFromRelease2.5.0

      • Display feature availability
        StartingFromRelease2.6.0

        • JS7 - Certificate Identity Service, see 
          Jira
          serverSOS JIRA
          columnIdsissuekey,summary,issuetype,created,updated,duedate,assignee,reporter,priority,status,resolution
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1547
        • JS7 - FIDO Identity Service, see 
          Jira
          serverSOS JIRA
          columnIdsissuekey,summary,issuetype,created,updated,duedate,assignee,reporter,priority,status,resolution
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1546
    • External Identity Services
      • Display feature availability
        StartingFromRelease2.2.0
        • JS7 - HashiCorp® Vault Identity Service, see 
          Jira
          serverSOS JIRA
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1146
      • Display feature availability
        StartingFromRelease2.3.0
        • Keycloak®, see 
          Jira
          serverSOS JIRA
          columnskey,summary,type,created,updated,due,assignee,reporter,priority,status,resolution
          serverId6dc67751-9d67-34cd-985b-194a8cdc9602
          keyJOC-1193

...

The JOC Cockpit implements an access layer to integrate a number of Identity Services for Identity and Access Management (IAM). 

Image RemovedImage Added

Built-in Identity Services

  • Built-in Identity Services ship with the JOC Cockpit and can be used out-of-the-box.
  • The JS7 - JOC Identity Service for local user management does not include elaborated features such as password recovery, password complexity constraints, password rotation, etc. and is not intended for such purposes. Instead, this Identity Service is intended as a starting point for users who operate JS7 for testing purposes.
  • The JS7 - LDAP Identity Service typically offers such features from an Identity Provider such as Active Directory.
  • The JS7 - OIDC Identity Service offers a token based authentication scheme for direct interaction between the user and the Identity Provider.
  • The JS7 - Certificate Identity Service works based on Client Authentication certificates that replace passwords.
  • The JS7 - FIDO Identity Service offers authentication from use of a secure device.

External Identity Services

  • Use of external Identity Services requires that users install and operate the respective relevant Identity Service product.
  • Depending on the nature of the Identity Service, security tokens are used that limit the scope (roles) and lifetime of access to JOC Cockpit.

User Account and Role Management

Permissions Finely-grained permissions are available at a fine-grained level for access to the JOC Cockpit functionalityfunctions, see see the JS7 - Default Roles and Permissions article for detailed information. 

Permissions and roles are managed with using the JOC Cockpit. User accounts and role assignments can be managed with using either the JOC Cockpit Identity Service or with external Identity Services, see . See the JS7 - Management of User Accounts, Roles and Permissions article for more information.

Image RemovedImage Added

Use of Identity Services

...

  • Required Identity Services: user login is performed with all required Identity Services. No optional Optional Identity Services are not considered.
  • Optional Identity Services: with the first successful login to an Identity Service the user is considered being to have logged in and no further Identity Service is Services are not consulted.

Identity Services can be ordered to specify a sequence of preferred or required services for authentication.
Image Removed
Image Added

Certificate Based Authentication

Certificates can be used for mutual authentication, see JS7 - Certificate based AuthenticationIdentity Service.

  • The client (Browser Client, REST API Client) challenges the JOC Cockpit server to present its Server Authentication Certificate that which is then verified by the client.
  • The JOC Cockpit server challenges the client to present its Client Authentication Certificate that which is then verified by the JOC Cockpit.

With When the JOC Cockpit being is set up for mutual authentication, certificates can be used to:

  • to enforce two-factor authentication with clients having to provide a certificate and a password,
  • to allow single-factor authentication using a certificate instead of  user of user account/password.
    .

Image Added

FIDO Authentication

The FIDO protocol family can be used for authentication, see JS7 - FIDO Identity Service.

  • FIDO2 and Passkeys can be used as a first or second factor for authentication in MFA.
  • FIDO U2F can be used as a second factor for authentication in MFA.

Image AddedImage Removed

Further Resources

Display children header

Display content by label
TypeHow To
Labelsjs7 api identity-service