Row Level Access Control

Row Level Access Control

Row Level Access Control (RLAC) is a security mechanism that restricts access to specific rows of data based on user roles and permissions. This provides a way to enforce fine-grained access policies and ensure that users can access only the data they are authorized to see. For example, in a contract manufacturing organization (CMO), RLAC enables the CMO to access and manage their specific data while allowing the parent company to view all data across the organization.

The benefits of enabling row level access control include:

  • Data Segmentation. Partition data based on roles, ensuring that sensitive information is accessible to only authorized users.
  • Enhanced Security. Reduce the risk of unauthorized access by enforcing strict access policies.
  • Operational specialization: Allow CMOs access to their specific data while maintaining oversight of the entire system.
  • Compliance: Meet regulatory requirements by controlling access to sensitive data.

Configure Row Level Access Control in Rhize BAAS

Configure RLAC in Rhize BAAS through the alpha.scopemap.scopemap.json property in the values.yaml file of the BAAS Helm chart. The scope map is a JSON file that defines rules, actions, jurisdictions, and resources. These rules combine OpenID Connect (OIDC) roles with resources and actions across jurisdictions (modeled as hierarchy scopes in ISA-95).

Example Configuration

Consider the following scenario: Acme Inc. contracts part of its supply chain to a CMO. To implement RLAC:

  1. Create an OIDC Role: Define a role called cmoAccess in your OIDC provider (e.g., Keycloak).
  2. Define a Hierarchy Scope. Create a hierarchy scope in Rhize called CMO. This scope is applied to objects or nodes in the graph that relate to the CMO.
  3. Add a Rule to the Scope Map: Define a rule in the scopemap.scopemap.json file as follows:
{
   {
     "rules": [
        {
            "id": "cmo-data-access",
            "description": "CMO data access to CMO hierarchy scoped resources and entities",
            "roles": ["cmoAccess"],
            "actions": ["query", "mutation"],
            "jurisdictions": ["CMO"]
        },
        ...other rules here...
    ],
    "actions": [
        "delete",
        "mutation",
        "query"
    ],
    ....
}
  1. Assign Roles to Users: As users sign up in Keycloak, assign them the cmoAccess role. This grants them permission to access equipment and data within the CMO hierarchy scope, while restricting access to data outside this scope.