User Mgmt - 2.0 and Beyond
Samuel Cozannet
samuel.cozannet at canonical.com
Wed Jun 1 09:04:17 UTC 2016
Good start. I would add
* external AAA connectivity (LDAP/AD) to find where the actual data is
stored.
* add user to units only (no access to Juju)
* share
++
Sam
--
Samuel Cozannet
Cloud, Big Data and IoT Strategy Team
Business Development - Cloud and ISV Ecosystem
Changing the Future of Cloud
Ubuntu <http://ubuntu.com> / Canonical UK LTD <http://canonical.com> / Juju
<https://jujucharms.com>
samuel.cozannet at canonical.com
mob: +33 616 702 389
skype: samnco
Twitter: @SaMnCo_23
[image: View Samuel Cozannet's profile on LinkedIn]
<https://es.linkedin.com/in/scozannet>
On Wed, Jun 1, 2016 at 10:58 AM, James Beedy <jamesbeedy at gmail.com> wrote:
> I've "conjured-up" what I think would be a great enhancement to the
> current user mgmt capability in 2.0.
>
> As things stand, one can add a user to a model, and set a permission
> category of either read (read), or write (read/write). This functionality
> is awesome, and a huge step for juju (applause)!!!!!
>
> Admins of juju can now create, manage, and maintain the users and users
> access policy associated with a model (applause, again, seriously).
>
> As a logical next step, why don't we take the user all the way to the
> instance?
>
> What I'm thinking of is an '--os' flag that could be specified on user
> creation!
>
> This flag would signify that the user need be created on the instances in
> the current model. Ssh keys key(s) for a user could be added, and
> *associated*, and provisioned alongside the respective user, and user
> account on the machine.
>
> This functionality would give juju deployed infrastructure a huge edge in
> the ease of user management/maintainability for any organization, and
> massive bragging rights in enterprise land due to the increased PCI
> compliance revolving around finer granularity in user access accounts.
>
> I feel like the majority of the big pieces are already In place, the
> primary road blocks I foresee (probably a lot more):
> 1. User sensitive ssh-keys
> 2. Machine-level user provisioning template /UserManagerModel
> 3. Os-level user access/permission policy (what is generic/default yet
> tuned and hardened?)
>
>
> That about wraps it up, hopefully I got my point across to some degree.
>
> Thoughts?
>
>
>
> --
> Juju mailing list
> Juju at lists.ubuntu.com
> Modify settings or unsubscribe at:
> https://lists.ubuntu.com/mailman/listinfo/juju
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/juju/attachments/20160601/8e53256c/attachment.html>
More information about the Juju
mailing list