...
|
LF Staff: LJ Illuzzi
Agenda
...
- Issue discussion/Dev updates
- L3AF R2
- RBAC https://github.com/l3af-project/l3af-arch/discussions/57
- Option 1: RBAC framework using x.509 PKI Certificate Attributes
- Not every CA will issue those types of certs (w/usernames)
- Option 2 OATH
- No work required. Just consume already existing resources.
- Many enterprises already using it.
- ex: Windows Active Directory
- Option 3. Digital Signature based Authorization with mTLS
- Minimal overhead.
- Partly extensible. Partly standards compliant.
- Protocols mature, framework not so mature.
- Option 4. SHA256 Hash based Authorization with mTLS
- Don't want l3af to be the actual auth service.
- Custom implementation
- Option 1: RBAC framework using x.509 PKI Certificate Attributes
- https://github.com/l3af-project/l3afd/pull/229
- https://github.com/l3af-project/l3afd/pull/242
- Loading XDP and TC program blockers
- https://github.com/l3af-project/l3afd/issues/191
- https://github.com/florianl/go-tc/issues/17 - Need to update with our issue.
- RBAC https://github.com/l3af-project/l3af-arch/discussions/57
- L3AFD v2.1
- L3AF on Windows
- L3AF R2
...