* | Consortia tenant checks | All | Background:
Discussion Notes: Much of this work has already been done. @Marc Johnson What is the relevance of this to the conversation? @Olamide Kolawole provided a walkthrough Consortia is comprised of two or more member libraries Consortia members collaborate and work together mod-consortia is optional - single-tenant deployments of FOLIO are not required to run this module and should be unaffected. The functionality allows one tenant to make calls to make API calls against another tenant by changing the x-okapi-tenant header (cross the tenant boundary) The authentication and authorization processes are still in place
@Marc Johnson how does the tenant check remain unchanged if mod-consortia is not being used? @Olamide Kolawole in the interest of time, we should try to focus on the tenant separation part of this during this meeting How are permissions handled? Users and their corresponding shadow users are managed independently Shadow users are not created with credentials - you won't be able to log in directly as a shadow user. Users are still managed via mod-users. Kafka messages are published when users are created. These messages are consumed by mod-consortia, which then interacts with mod-users to create the shadow users in other tenants.
@Maccabee Levine how are users/shadow users linked? @Axel Dörrer when is mod-consortia allowed to create shadow users in other tenants? From any tenant context? mod-consortia creates shadow users in other tenants when a user's affiliations are set/changed. Mod-consortia performs the tenant context switch in order to create the shadow user. How does mod-consortia do this if permissions don't cross tenant boundaries?
@Craig McNally we're running out of time, how shall we proceed? @Jeremy Huff Now that we have more background, I'm better prepared to have an in-depth conversation about the concerns. Suggestion: Get another Monday meeting scheduled to continue this discussion. Probably onJun 19, 2023
|