Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🏗️ Finalise QuickSight Identity Approach and Architecture #3703

Closed
6 tasks done
Tracked by #2955
julialawrence opened this issue Mar 13, 2024 · 8 comments
Closed
6 tasks done
Tracked by #2955

🏗️ Finalise QuickSight Identity Approach and Architecture #3703

julialawrence opened this issue Mar 13, 2024 · 8 comments
Assignees
Labels

Comments

@julialawrence
Copy link
Contributor

julialawrence commented Mar 13, 2024

User Story

If we want to deploy QuickSight we need to develop a full architectural diagram of the system as well as the identity approach and implementation.

Useful Contacts

AP Team, Rich B, Julia Lawrence

User Types

AP Operators

Hypothesis

The creation and recording of our identity decisions and architectural diagrams will remove uncertainty about the deliverable and allow smooth delivery of MVP scope

Proposal

Two hour-long meetings, first focussing on identity the second on broader architecture, answering questions and recording answers including:

Questions that need answering/recording

Recording:

  • QuickSight to be built out in Analytical Platform Compute Accounts
  • Authentication with AP UI + QuickSight will require a justice identity
  • Data stays where it is

Deciding:

  • Which identity option to select when creating the QS deployment that allows:
    • Using AAD directly or via Auth0 or Identity Center
    • Anonymous publishing/embedding
    • Joining of non-justice readers
    • Anonymous sharing

Additional Information

We need an architectural diagram and user identity interactions mapped out

Definition of Done

  • Meeting 1 scheduled and held
  • Meeting 2 scheduled and held
  • Identity approach agreed and documented
  • Architectural design agreed and documented
  • Follow-on stories raised
  • MVP scope adjusted if needed.
@julialawrence julialawrence moved this to 👀 TODO in Analytical Platform Mar 13, 2024
@julialawrence julialawrence added data-platform-apps-and-tools This issue is owned by Data Platform Apps and Tools 💄 Visualisation MI/BI (Epic #2955) labels Mar 13, 2024
@BrianEllwood BrianEllwood self-assigned this Mar 15, 2024
@BrianEllwood BrianEllwood moved this from 👀 TODO to 🚀 In Progress in Analytical Platform Mar 15, 2024
@BrianEllwood
Copy link
Contributor

invite for meeting 1 sent for 13:30 - 14:30 25/3/24. first available date for main participants

@BrianEllwood
Copy link
Contributor

New date as proposed by Julia sent out

@julialawrence julialawrence self-assigned this Mar 20, 2024
@julialawrence
Copy link
Contributor Author

Meeting held. Output diagram for Identity and MVP scope here:
https://mojdt.slack.com/archives/C04M8224WCV/p1710946598293109?thread_ts=1710944355.478139&cid=C04M8224WCV

@julialawrence
Copy link
Contributor Author

julialawrence commented Mar 20, 2024

Key outcomes from identity meeting:

  1. Rather than enabling a hybrid authentication approach, after a period of collecting users' justice identity information, and mapping it against their access levels, Control Panel will switch over to EntraID-based authentication.
  2. Once the switchover is complete, their justice rather than their github federated identity will be used for access to QuickSight and other AWS services.
  3. EntraID will be used directly for authentication with Control Panel, AP UI and QuickSight rather than proxied via Auth0
  4. QuickSight will be enabled with Federated, IAM and internal user identity option for access management to allow accomodation of more potential user joureys.

@michaeljcollinsuk
Copy link
Contributor

@julialawrence re: moving to use EntraID for authentication to the Control Panel (removing auth0) - currently we have some Auth0 rules defined that apply each time someone tries to log in. For control panel access, I think the important one is the check that they are in the moj-analytical-services github org group. If we move to using Entra ID, will we want to keep this restriction in place, or not? If we do, we will need to figure out a new way to check this.

@julialawrence
Copy link
Contributor Author

@julialawrence re: moving to use EntraID for authentication to the Control Panel (removing auth0) - currently we have some Auth0 rules defined that apply each time someone tries to log in. For control panel access, I think the important one is the check that they are in the moj-analytical-services github org group. If we move to using Entra ID, will we want to keep this restriction in place, or not? If we do, we will need to figure out a new way to check this.

We'd want to maintain this if there's only some people with justice identity shouldn't be allowed to join AP. We can replicate this with checking if users are in a specific group. If we don't perform this check with GH, anyone with GH account can join which is not good I assume. I assume this isn't an issue with justice identity.

@julialawrence
Copy link
Contributor Author

@julialawrence julialawrence moved this from 🚀 In Progress to 🛂 In Review in Analytical Platform Mar 28, 2024
@julialawrence
Copy link
Contributor Author

#3878
#3879
#3880
#3881

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Archived in project
Development

No branches or pull requests

4 participants