Consolidate LDAP roles into OPC UA session roles with granular write permissions
Map LDAP groups to custom OPC UA role NodeIds on RoleBasedIdentity.GrantedRoleIds during authentication, replacing the username-to-role side cache. Split ReadWrite into WriteOperate/WriteTune/WriteConfigure so write access is gated per Galaxy security classification. AnonymousCanWrite now behaves consistently regardless of LDAP state. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -27,7 +27,9 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
config.Ldap.Port.ShouldBe(3893);
|
||||
config.Ldap.BaseDN.ShouldBe("dc=lmxopcua,dc=local");
|
||||
config.Ldap.ReadOnlyGroup.ShouldBe("ReadOnly");
|
||||
config.Ldap.ReadWriteGroup.ShouldBe("ReadWrite");
|
||||
config.Ldap.WriteOperateGroup.ShouldBe("WriteOperate");
|
||||
config.Ldap.WriteTuneGroup.ShouldBe("WriteTune");
|
||||
config.Ldap.WriteConfigureGroup.ShouldBe("WriteConfigure");
|
||||
config.Ldap.AlarmAckGroup.ShouldBe("AlarmAck");
|
||||
config.Ldap.TimeoutSeconds.ShouldBe(5);
|
||||
}
|
||||
@@ -101,7 +103,7 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
provider.ValidateCredentials("readonly", "readonly123").ShouldBeTrue();
|
||||
var roles = provider.GetUserRoles("readonly");
|
||||
roles.ShouldContain("ReadOnly");
|
||||
roles.ShouldNotContain("ReadWrite");
|
||||
roles.ShouldNotContain("WriteOperate");
|
||||
roles.ShouldNotContain("AlarmAck");
|
||||
}
|
||||
catch (System.Exception)
|
||||
@@ -111,16 +113,16 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
}
|
||||
|
||||
[Fact]
|
||||
public void LdapAuthenticationProvider_ReadWriteUser_HasReadWriteRole()
|
||||
public void LdapAuthenticationProvider_WriteOperateUser_HasWriteOperateRole()
|
||||
{
|
||||
var ldapConfig = CreateGlAuthConfig();
|
||||
var provider = new LdapAuthenticationProvider(ldapConfig);
|
||||
|
||||
try
|
||||
{
|
||||
provider.ValidateCredentials("readwrite", "readwrite123").ShouldBeTrue();
|
||||
var roles = provider.GetUserRoles("readwrite");
|
||||
roles.ShouldContain("ReadWrite");
|
||||
provider.ValidateCredentials("writeop", "writeop123").ShouldBeTrue();
|
||||
var roles = provider.GetUserRoles("writeop");
|
||||
roles.ShouldContain("WriteOperate");
|
||||
roles.ShouldNotContain("AlarmAck");
|
||||
}
|
||||
catch (System.Exception)
|
||||
@@ -140,7 +142,7 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
provider.ValidateCredentials("alarmack", "alarmack123").ShouldBeTrue();
|
||||
var roles = provider.GetUserRoles("alarmack");
|
||||
roles.ShouldContain("AlarmAck");
|
||||
roles.ShouldNotContain("ReadWrite");
|
||||
roles.ShouldNotContain("WriteOperate");
|
||||
}
|
||||
catch (System.Exception)
|
||||
{
|
||||
@@ -159,7 +161,9 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
provider.ValidateCredentials("admin", "admin123").ShouldBeTrue();
|
||||
var roles = provider.GetUserRoles("admin");
|
||||
roles.ShouldContain("ReadOnly");
|
||||
roles.ShouldContain("ReadWrite");
|
||||
roles.ShouldContain("WriteOperate");
|
||||
roles.ShouldContain("WriteTune");
|
||||
roles.ShouldContain("WriteConfigure");
|
||||
roles.ShouldContain("AlarmAck");
|
||||
}
|
||||
catch (System.Exception)
|
||||
@@ -223,7 +227,9 @@ namespace ZB.MOM.WW.LmxOpcUa.Tests.Authentication
|
||||
ServiceAccountPassword = "serviceaccount123",
|
||||
TimeoutSeconds = 5,
|
||||
ReadOnlyGroup = "ReadOnly",
|
||||
ReadWriteGroup = "ReadWrite",
|
||||
WriteOperateGroup = "WriteOperate",
|
||||
WriteTuneGroup = "WriteTune",
|
||||
WriteConfigureGroup = "WriteConfigure",
|
||||
AlarmAckGroup = "AlarmAck"
|
||||
};
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user