deviceAccessCheck rule for talaria #42
Unanswered
utsavbatra5
asked this question in
Q&A
Replies: 1 comment 11 replies
-
Our trust model was developed to allow connections from devices that have a minimum level of trust to facilitate the configuration of a "blank" device. Note I didn't say "zero trust". That can just be one of the options. Trust levels are associated with each connection and (currently) are not reevaluated during the connection's life (i.e. if a token expired while the device is connected). There are three distinct enforcement points for trust.
I'm not sure where the code currently is, in terms of implementing these enforcement functions. |
Beta Was this translation helpful? Give feedback.
11 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We were trying to enable deviceAccessCheck rule for talaria by putting the check on the device "trust" parameter.
The config that we have maintained is:
deviceAccessCheck:
type: "enforce"
sep: ">"
checks:
-
name: "Devices with trust level > 2000"
deviceCredentialPath: "trust>2000"
inputValue: 2000
op: gt
or just having the deviceCredentialPath = "trust". But in no scenario, its restricting the device.
Can you please advice regarding the correct format for deviceCredentialPath?
The payload looks something like this below where we are trying to have a check on the field trust
{
"aud": "XMiDT",
"capabilities": [
"x1:issuer:test:.*:all"
],
"mac": "112233446538",
"partner-id": "comcast",
"serial": "mock-rdkb-simulator",
"sub": "client-supplied",
"trust": 1000
}
Beta Was this translation helpful? Give feedback.
All reactions