Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Access control on job registration #589

Closed
calvn opened this issue Dec 15, 2015 · 13 comments
Closed

Access control on job registration #589

calvn opened this issue Dec 15, 2015 · 13 comments

Comments

@calvn
Copy link

calvn commented Dec 15, 2015

Is there a best practice/recommendation for implementing access control on running jobs? Consul, for example, has ACLs to control who can register KVs and services. We can use Consul's ACLs to restrict service registration from Nomad jobs, but those jobs would still run on the Nomad clients (just not easily accessible without service discovery).

If ACLs or something similar is outside the scope of Nomad, what is the recommended way to control who can run jobs and how many jobs or resources as user can request? Thanks in advance!

@dadgar
Copy link
Contributor

dadgar commented Dec 15, 2015

This is something that we will be tackling in Nomad 0.4. For now there is no ACL policies or enforcement in Nomad.

@calvn
Copy link
Author

calvn commented Dec 15, 2015

Cool to know that this is on the roadmap, thanks for the quick response!

@doherty
Copy link

doherty commented Jul 24, 2016

I take it this didn't make it into 0.4.0, which was released recently. Is this still on the near-term roadmap?

@diptanu
Copy link
Contributor

diptanu commented Jul 25, 2016

@doherty Yes, this is very much on the roadmap.

@kyhavlov
Copy link
Contributor

Any chance this will go into an 0.4.x release soon? I'm looking into using nomad for deploying apps and this would be a really useful feature, even in very basic form.

@dadgar
Copy link
Contributor

dadgar commented Aug 12, 2016

@kyhavlov It will not be in a 0.4.x release

@kyhavlov
Copy link
Contributor

kyhavlov commented Aug 13, 2016

Just to lay out the things I'd be looking for in an ACL system for Nomad:

  • Tokens used for authentication, similar to Consul with management and client type tokens for administrating ACL policies (and the ability to set policies on the default/anonymous token)
  • Policies on tokens to limit tasks deployed by the token on total cpu/memory/disk/network usage, on a per-region/datacenter basis.
  • Non-management tokens should probably be prohibited from affecting tasks run by other tokens
  • Management tokens get access to all tasks

Does that align with what you guys were already planning for an ACL system in the future? I'd be interested in helping make it happen if that's the case.

@vrenjith
Copy link
Contributor

Is this feature planned in any release?

@dadgar
Copy link
Contributor

dadgar commented Sep 20, 2016

It will most likely be in Nomad 0.7.

Thanks,
Alex Dadgar

On Tue, Sep 20, 2016 at 9:32 AM, vrenjith [email protected] wrote:

Is this feature planned in any release?


You are receiving this because you commented.
Reply to this email directly, view it on GitHub
#589 (comment),
or mute the thread
https://github.com/notifications/unsubscribe-auth/AA_9ahcPxHRHec7QgnxuvdzflaaJD_rfks5qsAqtgaJpZM4G120i
.

@jhmartin
Copy link

Without ACL's it looks like a single subverted nomad 'agent' node effectively subverts the entire cluster, that makes for a very difficult security story.

@mkuzmin
Copy link

mkuzmin commented Jul 3, 2017

related issue: #227

@dadgar
Copy link
Contributor

dadgar commented Nov 3, 2017

Hey all! This has landed in Nomad 0.7! https://www.nomadproject.io/guides/acl.html

@dadgar dadgar closed this as completed Nov 3, 2017
@github-actions
Copy link

github-actions bot commented Dec 6, 2022

I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Dec 6, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

8 participants