Cedarling Policy Store#
The Cedarling Policy Store uses a JSON file named cedarling_store.json
to store all necessary data for evaluating policies and verifying JWT tokens. The structure includes the following key components:
- Cedar Schema: The Cedar schema encoded in Base64.
- Cedar Policies: The Cedar policies encoded in Base64.
- Trusted Issuers: Details about the trusted issuers (see below for syntax).
Note: The cedarling_store.json
file is only needed if the bootstrap properties: CEDARLING_LOCK
; CEDARLING_POLICY_STORE_URI
; and CEDARLING_POLICY_STORE_ID
are not set to a local location. If you're fetching the policies remotely, you don't need a cedarling_store.json
file.
JSON Schema#
The JSON Schema accepted by cedarling is defined as follows:
{
"cedar_version": "v4.0.0",
"policy_stores": {
"some_unique_string_id": {
"name": "TestPolicy",
"description": "Once upon a time there was a Policy, that lived in a Store.",
"policies": { ... },
"schema": { ... },
"trusted_issuers": { ... }
}
}
}
- cedar_version : (String) The version of Cedar policy. The protocols of this version will be followed when processing Cedar schema and policies.
- policies : (Object) Object containing one or more policy IDs as keys, with their corresponding objects as values. See: policies schema.
- schema : (String | Object) The Cedar Schema. See schema below.
- trusted_issuers : (Object of {unique_id => IdentitySource}(#trusted-issuer-schema)) List of metadata for Identity Sources.
schema
#
Either String or Object, where Object is preferred.
Where Object - An object with encoding
, content_type
and body
keys. For example:
"schema": {
"encoding": "none", // can be one of "none" or "base64"
"content_type": "cedar", // can be one of "cedar" or "cedar-json"
"body": "namespace Jans {\ntype Url = {"host": String, "path": String, "protocol": String};..."
}
"schema": "cGVybWl0KAogICAgc..."
Cedar Policies Schema#
The policies
field describes the Cedar policies that will be used in Cedarling. Multiple policies can be defined, with each policy requiring a unique_policy_id
.
"policies": {
"unique_policy_id": {
"cedar_version" : "v4.0.0",
"name": "Policy for Unique Id",
"description": "simple policy example",
"creation_date": "2024-09-20T17:22:39.996050",
"policy_content": { ... },
},
...
}
- unique_policy_id: (String) A uniqe policy ID used to for tracking and auditing purposes.
- name : (String) A name for the policy
- description : (String) A brief description of cedar policy
- creation_date : (String) Policy creating date in
YYYY-MM-DDTHH:MM:SS.ssssss
- policy_content : (String | Object) The Cedar Policy. See policy_content below.
policy_content
#
Either String or Object, where Object is preferred.
Where Object - An object with encoding
, content_type
and body
keys. For example:
"policy_content": {
"encoding": "none", // can be one of "none" or "base64"
"content_type": "cedar", // ONLY "cedar" for now due to limitations in cedar-policy crate
"body": "permit(\n principal is Jans::User,\n action in [Jans::Action::\"Update\"],\n resource is Jans::Issue\n)when{\n principal.country == resource.country\n};"
}
"policy_content": "cGVybWl0KAogICAgc..."
Example of policies
#
Here is a non-normative example of the policies
field:
"policies": {
"840da5d85403f35ea76519ed1a18a33989f855bf1cf8": {
"cedar_version": "v2.7.4",
"name": "Policy-the-first",
"description": "simple policy example for principal workload",
"creation_date": "2024-09-20T17:22:39.996050",
"policy_content": "cGVybWl0KAogICAgc..."
},
"0fo1kl928Afa0sc9123scma0123891asklajsh1233ab": {
"cedar_version": "v2.7.4",
"name": "Policy-the-second",
"description": "another policy example",
"creation_date": "2024-09-20T18:22:39.192051",
"policy_content": "kJW1bWl0KA0g3CAxa..."
},
"1fo1kl928Afa0sc9123scma0123891asklajsh1233ac": {
"cedar_version": "v2.7.4",
"name": "Policy-the-third",
"description": "another policy example",
"creation_date": "2024-09-20T18:22:39.192051",
"policy_content": {
"encoding": "none",
"content_type" : "cedar",
"body": "permit(...) where {...}"
}
},
"2fo1kl928Afa0sc9123scma0123891asklajsh1233ad": {
"cedar_version": "v2.7.4",
"name": "Policy-the-fourth",
"description": "another policy example",
"creation_date": "2024-09-20T18:22:39.192051",
"policy_content": {
"encoding": "base64",
"content_type" : "cedar",
"body": "kJW1bWl0KA0g3CAxa..."
}
},
...
}
Trusted Issuers Schema#
This record contains the information needed to validate tokens from this issuer:
"identity_source": {
"some_unique_id" : {
"name": "name_of_the_trusted_issuer",
"description": "description for the trusted issuer",
"openid_configuration_endpoint": "https://<trusted-issuer-hostname>/.well-known/openid-configuration",
"access_tokens": {
"trusted": true,
"principal_identifier": "jti",
...
},
"id_tokens": { ... },
"userinfo_tokens": { ... },
"tx_tokens": { ... },
}
...
}
- name : (String) The name of the trusted issuer.
- description : (String) A brief description of the trusted issuer, providing context for administrators.
- openid_configuration_endpoint : (String) The HTTPS URL for the OpenID Connect configuration endpoint (usually found at
/.well-known/openid-configuration
). - identity_source : (Object, optional) Metadata related to the tokens issued by this issuer.
Notes:
- The access_tokens
, id_tokens
, userinfo_tokens
, and tx_tokens
fields will follow the Token Metadata Schema.
- The access_tokens
will contain a trusted
and principal_identifier
field in addition to the fields from the Token Metadata Schema
.
Token Metadata Schema#
The Token Entity Metadata Schema defines how tokens are mapped, parsed, and transformed within Cedarling. It allows you to specify how to extract user IDs, roles, and other claims from a token using customizable parsers.
{
"user_id": "<field name in token (e.g., 'email', 'sub', 'uid', etc.) or '' if not used>",
"role_mapping": "<field for role assignment (e.g., 'role', 'memberOf', etc.) or '' if not used>",
"claim_mapping": {
"mapping_target": {
"parser": "<type of parser ('regex' or 'json')>",
"type": "<type identifier (e.g., 'Acme::Email')>",
"...": "Additional configurations specific to the parser"
},
},
}
- role_mapping: (String, Optional) Indicates which field in the token should be used for role-based access control. If not needed, set to an empty string (
""
). - claim_mapping: Defines how to extract and transform specific claims from the token. Each claim can have its own parser (
regex
orjson
) and type (Acme::Email
,Acme::URI
, etc.).
Note: You can include a role_mapping
in each token but only the first one that get parsed will be recognized by Cedarling. Cedarling parses the role_mapping
s for each token in this order:
access_tokens
id_tokens
userinfo_tokens
tx_tokens
Example Policy store#
Here is a non-normative example of a cedarling_store.json
file:
{
"cedar_version": "v4.0.0",
"policies": {
"840da5d85403f35ea76519ed1a18a33989f855bf1cf8": {
"description": "simple policy example",
"creation_date": "2024-09-20T17:22:39.996050",
"policy_content": "cedar_policy_encoded_in_base64"
}
},
"schema": "schema_encoded_in_base64",
"identity_source": {
"08c6c18a654f492adcf3fe069d729b4d9e6bf82605cb" : {
"name": "Google",
"description": "Consumer IDP",
"openid_configuration_endpoint": "https://accounts.google.com/.well-known/openid-configuration",
"access_tokens": {
"trusted": true,
"principal_identifier": "",
"role_mapping": "",
},
"id_tokens": {
"trusted": true,
"principal_identifier": "sub",
"role_mapping": "",
},
"userinfo_tokens": {
"trusted": true,
"principal_identifier": "",
"role_mapping": "role",
},
"tx_tokens": {
"trusted": true,
"principal_identifier": "",
"role_mapping": "",
},
}
}
}
Policy and Schema Authoring#
You can hand create your Cedar policies and schema in Visual Studio. Make sure you run the cedar command line tool to validate both your schema and policies.
The easiest way to author your policy store is to use the Policy Designer in Agama Lab. This tool helps you define the policies, schema and trusted IDPs and to publish a policy store to a Github repository.
Minimum supported cedar-policy schema
#
Here is example of a minimum supported cedar-policy schema
:
namespace Jans {
entity id_token = {"aud": String,"iss": String, "sub": String};
entity Role;
entity User in [Role] = {};
entity Access_token = {"aud": String,"iss": String, "jti": String, "client_id": String};
entity Workload = {};
entity Issue = {};
action "Update" appliesTo {
principal: [Workload, User, Role],
resource: [Issue],
context: {}
};
}
You can extend all of this entites and add your own.
Mandatory entities is: id_token
, Role
, User
, Access_token
, Workload
.
Issue
entity and Update
action are optinal. Is created for example, you can create others for your needs.
Context
and Resource
entities you can pass during authorization request and next entites creating based on the JWT tokens:
id_token
- entity based on theid
JWT token fields.-
ID for entity based in
jti
field. -
Role
- define role of user. - Mapping defined in
Token Metadata Schema
. - Claim in JWT usually is string or array of string.
-
If many roles present, the
cedarling
will try each to find first permit case. -
User
- entity based on theid
anduserinfo
JWT token fields. - If
id
anduserinfo
JWT token fields has differentsub
value,userinfo
JWT token will be ignored. -
ID for entity based in
sub
field. (will be changed in future) -
Access_token
- entity based on theaccess
JWT token fields. -
ID for entity based in
jti
field. -
Workload
- entity based on theaccess
JWT token fields. - ID for entity based in
client_id
field.
Note on test fixtures#
You will notice that test fixtures in the cedarling code base are quite often in yaml rather than in json.
yaml is intended for cedarling internal use only.
The rationale is that yaml has excellent support for embedded, indented, multiline string values. That is far easier to read than base64 encoded json strings, and is beneficial for debugging and validation that test cases are correct.
Created: 2024-10-08