Introduction
The JS7 - Security Architecture includes use of JS7 - Identity Services for JS7 - Authentication and JS7 - Authorization.
- Identity Services implement authentication methods and access to Identity Providers, for example credentials such as user account/password are used as an authentication method to access an LDAP Directory Service as the Identity Provider.
- The JS7 supports a number of Identity Services:
- Build-in Identity Services
-
FEATURE AVAILABILITY STARTING FROM RELEASE 2.3.0
- JS7 - JOC Identity Service, see - JOC-1148Getting issue details... STATUS
- JS7 - LDAP Identity Service, see - JOC-1147Getting issue details... STATUS
-
FEATURE AVAILABILITY STARTING FROM RELEASE 2.3.0
- External Identity Services
-
FEATURE AVAILABILITY STARTING FROM RELEASE 2.3.0
- JS7 - HashiCorp® Vault Identity Service, see - JOC-1146Getting issue details... STATUS
- FEATURE AVAILABILITY STARTING FROM RELEASE 2.4.0
-
FEATURE AVAILABILITY STARTING FROM RELEASE 2.3.0
- Build-in Identity Services
Identity and Access Management
The JOC Cockpit implements an access layer to integrate a number of Identity Services for Identity and Access Management (IAM).
Built-in Identity Services
- Built-in Identity Services ship with JOC Cockpit and can be used out-of-the-box.
- The JS7 - JOC Identity Service for local user management does not include elaborated features such as password recovery, password complexity constraints, password rotation etc. and is not intended for such purposes. Instead, this Identity Service is a starting point for users who operate JS7 for testing purposes.
- The JS7 - LDAP Identity Service typically offers such features from an Identity Provider such as Active Directory.
External Identity Services
- Use of external Identity Services requires that users install and operate the respective Identity Service product.
- Depending on the nature of the Identity Service security tokens are used that limit the scope (roles) and lifetime of access to JOC Cockpit.
User Account and Role Management
Permissions are available at a fine-grained level for access to the JOC Cockpit functionality, see JS7 - Default Roles and Permissions.
Permissions and roles are managed with JOC Cockpit. User accounts and role assignments can be managed with JOC Cockpit or with external Identity Services, see JS7 - Management of User Accounts, Roles and Permissions.
Use of Identity Services
A number of Identity Services can be used at the same time:
- Required Identity Services: user login is performed with all required Identity Services. No optional Identity Services are considered.
- Optional Identity Services: with the first successful login to an Identity Service the user is considered being logged in and no further Identity Service is consulted.
Identity Services can be ordered to specify a sequence of preferred services for authentication.
Certificate Based Authentication
Certificates can be used for mutual authentication, see JS7 - Certificate based Authentication.
- The client (Browser Client, REST API Client) challenges the JOC Cockpit server to present its Server Authentication Certificate that is verified by the client.
- The JOC Cockpit server challenges the client to present its Client Authentication Certificate that is verified by JOC Cockpit.
With JOC Cockpit being set up for mutual authentication certificates can be used
- to enforce two-factor authentication with clients having to provide a certificate and a password,
- to allow single-factor authentication using a certificate instead of user account/password.
Further Resources
Pages
Navigation