Row Level Access Control
Row Level Access Control (RLAC) is a security mechanism that restricts access to specific rows of data based on user roles and permissions. This provides a way to enforce fine-grained access policies and ensure that users can access only the data they are authorized to see. For example, in a contract manufacturing organization (CMO), RLAC enables the CMO to access and manage their specific data while allowing the parent company to view all data across the organization.
The benefits of enabling row level access control include:
- Data Segmentation. Partition data based on roles, ensuring that sensitive information is accessible to only authorized users.
- Enhanced Security. Reduce the risk of unauthorized access by enforcing strict access policies.
- Operational specialization: Allow CMOs access to their specific data while maintaining oversight of the entire system.
- Compliance: Meet regulatory requirements by controlling access to sensitive data.
Configure Row Level Access Control in Rhize BAAS
Configure RLAC in Rhize BAAS through the alpha.scopemap.scopemap.json
property in the values.yaml
file of the BAAS Helm chart.
The scope map is a JSON file that defines rules, actions, jurisdictions, and resources. These rules combine OpenID Connect (OIDC) roles with resources and actions across jurisdictions (modeled as hierarchy scopes in ISA-95).
Example Configuration
Consider the following scenario: Acme Inc. contracts part of its supply chain to a CMO. To implement RLAC:
- Create an OIDC Role: Define a role called
cmoAccess
in your OIDC provider (e.g., Keycloak). - Define a Hierarchy Scope. Create a hierarchy scope in Rhize called
CMO
. This scope is applied to objects or nodes in the graph that relate to the CMO. - Add a Rule to the Scope Map: Define a rule in the
scopemap.scopemap.json
file as follows:
{
{
"rules": [
{
"id": "cmo-data-access",
"description": "CMO data access to CMO hierarchy scoped resources and entities",
"roles": ["cmoAccess"],
"actions": ["query", "mutation"],
"jurisdictions": ["CMO"]
},
...other rules here...
],
"actions": [
"delete",
"mutation",
"query"
],
....
}
- Assign Roles to Users: As users sign up in Keycloak, assign them the
cmoAccess
role. This grants them permission to access equipment and data within theCMO
hierarchy scope, while restricting access to data outside this scope.