Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(meta): action plan 3/15 #76

Open
9 of 11 tasks
rt2zz opened this issue Mar 15, 2018 · 1 comment
Open
9 of 11 tasks

(meta): action plan 3/15 #76

rt2zz opened this issue Mar 15, 2018 · 1 comment

Comments

@rt2zz
Copy link
Member

rt2zz commented Mar 15, 2018

db

  • add
    • mode,
    • verified
    • secret to alias
  • add mode to session

mode

  • For permissions I am currently thinking there are 3 plus the defacto "none": read, write, confirm. Where read is basically login, write is manage aliases, and confirm is 2fa. We can model this as a bitmask a la linux modes.

idWarrant

  • add mode and allAlias to idWarrant
  • add publicKey to idWarrant

api

  • add notifier methods
  • add ability for user to get all aliases
    • question: how does this work for 2fa alias where the “credential” is actually a secret seed
      • may need a new column named “confirmSeed” which is never part of public responses
    • how does api look like? can we work this in with onIdWarrant. Perhaps onAuth(idWarrant, aliases)
  • store unverified credentials (with verified: false column)
  • implement sous-temp core api accessToken
    • something like { idWarrant, roles }

publicKey

do we:

  1. lock the publicKey to a session (store in db)?
  2. allow publicKey to change on refreshIdWarrant
  3. add publicKey on the initial idWarrant, and then after carry the same pub key to each refreshed warrant
@rt2zz
Copy link
Member Author

rt2zz commented Mar 21, 2018

  • add confirmed aliases to session
  • hook up publicKey

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant