Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support notebook protection enabled globally for an instance as default #2146

Open
mstair opened this issue Jun 28, 2016 · 3 comments
Open
Milestone

Comments

@mstair
Copy link

mstair commented Jun 28, 2016

For installations where you have multiple RCloud instances that share common infrastructure to store notebooks, support enabling notebook protection globally for an instance.

The driver being if one instance supports more sensitive data and you need to ensure some simple protection against data leakage via notebook content, without users will needing to manually configure each new notebook.

It's understood there will need to be consideration/dependency on a predefined global group with membership for all users.

@gordonwoodhull gordonwoodhull added this to the 1.7 milestone Jun 29, 2016
@gordonwoodhull
Copy link
Contributor

gordonwoodhull commented Jun 29, 2016

I can see how this would be helpful.

Please note that in the current implementation, these notebooks will not be available to view anonymously - the encryption depends on logging in.

IOW, currently if you can run the notebook you can view the code.

@gordonwoodhull
Copy link
Contributor

I apologize, @mstair, we did not get to this in release 1.7.

It should be pretty easy to set a default encryption group. What's trickier is adding users automatically to that group. Currently we don't do user management ourselves - if a user has a Unix login and a GitHub login which correspond to the RCloud instance, they can log in. So we don't even detect when a new user shows up.

Something that's even trickier is that an encryption group is currently owned by a particular user, and that user needs to be logged in in order for the credentials to be present to change the encryption group. This other kind of group would have to be owned by the RCloud instance in a secure way, and I'm not sure how to do that.

@gordonwoodhull gordonwoodhull modified the milestones: 1.8, 1.7 Nov 11, 2016
@mstair
Copy link
Author

mstair commented Nov 11, 2016

@gordonwoodhull completely understood and now that I have a better understanding of RCloud internals and account management, this request may be out of scope.

@gordonwoodhull gordonwoodhull modified the milestones: 1.8, Unknown Apr 20, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants