More flexibility for VOB element protection: using more than 16 groups per user on Linux/UNIX platforms
WHAT'S THE PROBLEM?
ClearCase administrators often need to set up access controls on VOB elements to meet their companies' information security policy. Operating system groups are a popular way to manage protections: users are assigned to groups, and those groups are used for element access checks.
This works nicely when groups are used for VOB element access control lists (ACLs), introduced in ClearCase 8.0.1, or for UNIX-style mode bit checks based on the VOB element's group ownership. However, it only works as long as a single user only needs 16 or fewer groups to access all authorized elements.
VOB element ACLs can reduce the need for a user to be a member of multiple groups: instead of having one user with multiple groups accessing elements each with a single group, you configure the ACL to protect elements to be accessible by multiple groups and each user only
needs one (or a few) group(s) to access the elements.
For example, a shared component "S" would allow access to the groups representing the teams that consume that component ("A" and "B") and to the team that maintains the component ("S"). Then the developers of components A and B only need membership in the respective team-group (A or B), and the developers of the shared component only need membership
in group S.
But some administrators had extra burdens managing their group membership this way: their organization's security policy was built around separate groups for each component, with users assigned membership in the groups needed for all components their project used. ACLs could solve the problem technically but the management of ACLs to allow multiple groups per element had a higher administrative overhead than using a single group per element.
In the above example, developers for component A need membership in group A and group S; likewise for B developers.
With this model, some users (such as a build integration account) need to be members of too many groups for ClearCase to recognize all of them, due to limitations explained in this technote: http://www.ibm.com/support/docview.wss?uid=swg21131881.
WHAT'S THE SOLUTION?
ClearCase 188.8.131.52 and later support a mode where the group membership of each user is evaluated on the VOB and view server hosts. The idea is similar to behavior supported by NFS servers: the server looks up the user in the operating system's group membership database, and uses the resulting group list when evaluating access. This works around the former 16-group limit that applies when the client's group list is sent to the server.
For example, a user in 50 groups will have all 50 groups recognized by the VOB and view. Access checks are evaluated based on those groups.
For full details on supported platforms and configurations, see this technote: http://www.ibm.com/support/docview.wss?uid=swg27049432
Reach out with questions below.