Chapter 7. Security

Table of Contents

7.1. Manager and Agent
7.2. Networking
7.3. User-to-Manager Authentication
7.4. Manager-to-User Authentication
7.5. Authentication and Authorization Operation Scheme
7.5.1. User → Manager
7.5.2. Manager → Agent
7.5.3. Agent → Manager
7.5.4. Lifetime of Access and Refresh Tokens
7.6. User Authentication via OpenID Connect
7.6.1. Creating a PPEM Client in Keycloak
7.6.2. Configuring the Manager for Integration with Keycloak
7.6.3. Associating Keycloak and PPEM Groups
7.6.4. Important Considerations
7.6.5. User Authentication Process
7.7. Role-Based Access Control (RBAC) Model
7.7.1. Key Concepts
7.7.2. RBAC in PPEM
7.7.3. Implementation
7.7.4. Object-Specific Roles
7.7.5. Checking Access Privileges of Subjects
7.8. Audit Event Log