Policy

Policies control access to resources and authorization to act on resources, such as to change them, via permissions. Verify Privilege DevOps Vault permissions are foundational for proper operation and security.

Commands that Act on Policy

Command Action
create create a policy in the vault
edit modify a policy using the OS’s default command-line editor, such as VI, nano, or Notepad
read view a policy details
update policy updates are all or nothing, so required fields must be included in the update and if optional fields are not included, they are deleted or go to default
rollback for a policy that has had more than one version, roll back to an earlier version
delete delete a policy
search search for a policy
restore restore a policy (if within 72 hours of deletion and not hard deleted)

To get a json encoded list of all Policies, use:

Copy
dsv policy search

You can add a query item to search Policies by path:

dsv policy search secrets/databaseordsv policy search --query secrets/databases

A typical Policy looks like this:

Copy
created: '2019-09-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2019-09-24T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: secrets:servers:us-west
permissionDocument:
- actions:
  - read
  conditions: {}
  description: ''
  effect: allow
  id: xxxxxxxxxxxxxxxxxxxx
  meta:
  resources:
  - secrets:servers:us-west:<.*>
  subjects:
  - groups:west admins
version: '5'

A policy contains a list of permissions which define access to resource paths. The policy itself has a top level path which is the identifier of the policy as well. The policy path is used to validate the resource paths in the permission documents. This allows administrators to delegate user ownership of policies without allowing self elevation through modifying the policy to a higher level path.

For example, the policy above has a path of secrets:servers:us-west. Permissions can be created for resources paths like secrets:servers:us-west, secrets:servers:us-west:<.*>, or secrets:servers:us-west:prod:<.*>. A permission document cannot be created on the policy to allow users to manage users, i.e. with a resource path of users:<*>. Because the policy path must be the root of any resource paths in its permission documents.

The one exception is policy delegation. An admin can create a policy and add a resource path for config:policies:secrets:servers:us-west to allow users to manage the policy. An example of this is below

The permission document has the following elements:

Element Definition
actions a list of possible actions on the resource including create, read, update, delete, list, and assign (regular expressions and list supported)
conditions an optional CIDR range to lock down access to a specific IP range
description human friendly description of the Policy intent
effect whether the Policy is allowing or preventing access; valid values are allow and deny
id system-generated unique identifier to track changes to a particular Policy
resources the resource path defining the targets to which the permissions apply; a resource path prefixes the entity type (secrets, clients, roles, users, config, config:auth, config:policies, audit) to a colon delimited path to the resource.
subjects the Policy provides authorization to these entries. Includes Users, Roles, and Groups

Policy Evaluation

To correctly evaluate permission Policies, you must know the rules that apply to permissions.

  • Values for permission properties may optionally be specified using a regular expression enclosed in angle brackets <>. For example,

    a subject entry could be written as ["users:<bob|alice>"]. Here, users bob and alice are specified. A longer alternative would be

    ["users:bob", "users:alice"].

  • Permissions are cumulative.

    • If there is a top level permission for the path secrets:servers:<.*> that grants a User write access, then even if they are only granted read access at the resource path secrets:servers:webservers:<.*>, they will still have write access due to the top level implicit match.
  • effect can either be allow or deny. If not specified, it defaults to allow
  • An explicit deny trumps an explicit or implicit allow.
  • At least one action must be listed in an array. Actions are explicit. A User assigned update and read will not automatically have create for the resource path.
  • For actions, the wildcard form <.*> replaces any other values, since it is an all-inclusive form. A wildcard could be written as a standard <.*> form, but also as .* or * for convenience. The backend automatically converts it to <.*>.
  • Invalid actions are not allowed, unless there is a wildcard element. Valid actions are create, read, update, delete, assign, list.
  • The list action has a special behavior.

    • First, list (search) is global—it runs across all items of an entity (any of the resources like Users, Roles, Groups, etc), not limited to paths and sub-paths.
    • Second, to grant a User an ability to search entities via list, use the root of the entity if you want list to include other entities and actions within the same Policy. The root entity, for example, is secrets, with no other characters following.
    • See the example on Search
  • At least one subject must be listed in an array. A prefix is required. For example, a valid subject is "users:bob". Valid prefixes are groups, roles, users.
  • Subjects and actions are automatically converted to lower case upon save.

Policy Examples

When creating or updating a Policy, a workflow can be started using dsv policy create or dsv policy update without flags. This will start step-by-step questions to guide you though the process. However, in the following examples, the direct command will be shown.

Deny Access at a Lower Level

Case: Subjects need access to Secrets for an environment, but that logical environment contains a more restricted area.

Solution: Two Policies. The first provides the Subjects (developer1@thycotic.com|developer2@thycotic.com) general access to the Secrets resources at the path secrets:servers:us-east-1:<.*>.

The direct command to create this policy is

Copy
dsv policy create --path secrets:servers:us-east-1 --actions '<.*>' --desc 'Developer Policy' --subjects 'users:<developer1@thycotic.com|developer2@thycotic.com>' --effect allow

With the trickiest part being to remember the "secrets" prefix on the path.

Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: secrets:servers:us-east-1
permissionDocument:
- id: xxxxxxxxxxxx
description: Developer Policy.
subjects:
- users:<developer1@thycotic.com|developer2@thycotic.com>
actions:
- "<read|delete|create|update>"
effect: allow
resources:
- secrets:servers:us-east-1:<.*>

The second Policy adds a specific path at a level lower (secrets:servers:us-east-1:production) to explicitly deny access to developer1@thycotic.com, as in the following example.

The command to create this policy is

Copy
dsv policy create --path secrets:servers:us-east-1:production --actions '<.*>' --desc 'Developer Deny Policy' --subjects 'users:<developer1@thycotic.com>' --effect deny
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: secrets:servers:us-east-1:production
permissionDocument:
- id: xxxxxxxxxxxx
description: Developer Deny Policy.
subjects:
- users:<developer1@thycotic.com>
actions:
- "<.*>"
effect: deny
resources:
- secrets:servers:us-east-1:production:<.*>

Allow Users to Assign Specific Roles to New Clients

Case: A User needs to assign Roles when they create client credentials, but must not be able to self-elevate by assigning an admin level Role.

Solution: Use a naming convention when creating Roles and specify a prefix with a wildcard to only allow Users to assign Roles that match the naming convention, as modeled in the following example.

The command to run this is

Copy
dsv policy create roles:dev-role --subjects users:developer@thycotic.com,roles:onboarding-role --desc 'Role Assignment' --resources 'roles:dev-role-<.*>' --actions assign
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: roles:dev-role
permissionDocument:
- id: xxxxxxxxxxxx
description: Limited Role Assignment Policy.
subjects:
- users:developer@thycotic.com
- roles:onboarding-role
actions:
- assign
effect: allow
resources:
- roles:dev-role-<.*>

Allow User2 Access to User1's Home Vault

Case User2 need access to a secrets space (folder) in User1's Home Vault

Solution: Have an Admim create a policy that enables access. In this example, we assume User1 has a secret in their home vault at: databases/mongo/primary and wants to give User2 read rights to anything under databases, but not their entire Home vault

The command the Admin will run to create the policy would be:

Copy
dsv policy create --path home:users:user1:databases --actions '<read>' --desc 'User2 to access User1 Home/databases' --subjects 'users:User2' --effect allow

Notice the path starts with home:users:<username>

When User1 is authenticated and needs to access the secret the command would be dsv home read databases/mongo/primary

When User2 is authenticated and needs to access the secret the command would be dsv home read users:User1/databases/mongo/primary

Enable a Group to search Secrets

Case: Allow a Group to search secrets

Solution: Under the Resource entity, Secrets, enable the Group named "admins".

The command to create this policy is

Copy
dsv policy create secrets --subjects groups:admins --desc 'secret search' --resources secrets --actions list
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: secrets
permissionDocument:
- actions:
  - list
  conditions: {}
  description: secret search
  effect: allow
  id: xxxxxxxxxxxx
  meta: null
  resources:
  - secrets
  subjects:
  - groups:admins
version: "0"

Note: Searching secrets only enables the users to see the path, but not the actual data in the secret. That would require Read access at the proper path.

Allow Users to List Specific Entities

Case: A User needs to search across all items but only needs full read access on specific ones

Solution: Add a list action and the root of the entity used for searching.

In the example below, roles is the entity for reading and searching (list action). In the resources section, roles:dev-role-<.>* is used for reading, while roles is used for searching.

The command to create this policy is

Copy
dsv policy create roles --subjects users:developer@thycotic.com,roles:onboarding-role --desc 'Role Searching' --resources 'roles:dev-role-<.*>,roles' --actions read,list
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: roles
permissionDocument:
- actions:
  - read
  - list
  conditions: {}
  description: Role Searching
  effect: allow
  id: xxxxxxxxxxxx
  meta: null
  resources:
  - roles:dev-role-<.*>
  - roles
  subjects:
  - users:developer@thycotic.com
  - roles:onboarding-role
version: "0"

The syntax of the latter is important. In general, the root form of an entity has no * after the entity name, or anything besides the name.

Delegate Policy Authority

Case: An admin wants to delegate control to various team leads at a sub-path.

Solution: Under Resources, add config:policies followed by the resource path.

The command to create this policy is

Copy
dsv policy create secrets:servers --actions create,read,update,delete --resources 'secrets:servers:<.*>,config:policies:secrets:servers:<.*>' --subjects 'users:<developer1@thycotic.com|developer2@thycotic.com>'
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: secrets:servers
permissionDocument:
- actions:
  - create
  - read
  - update
  - delete
  conditions: {}
  description: ""
  effect: allow
  id: xxxxxxxxxxxx
  meta: nullb 
  resources:
  - secrets:servers:<.*>
  - config:policies:secrets:servers:<.*>
  subjects:
  - users:<developer1@thycotic.com|developer2@thycotic.com>
version: "0"

Now the developers can create Policies below the secrets:servers: path; for example, developer1 can create Policies for secrets:servers:webservers and developer2 can do the same at secrets:servers:databases.

Read Audits

Case: A user needs to be able to read audit records

Solution: Add a policy for the audit resource path

The command to create this policy is

Copy
dsv policy create audit --actions list --resources audit --subjects users:developer1@thycotic.com
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: audit
permissionDocument:
- actions:
  - list
  conditions: {}
  description: ""
  effect: allow
  id: xxxxxxxxxxxx
  meta: null
  resources:
  - audit
  subjects:
  - users:developer1@thycotic.com
version: "0"

Manage An Auth Provider

Case: A user needs to update a single auth provider

Solution: Add a policy for the config:auth provider path

The command to create this policy is

Copy
dsv policy create config:auth:gcp-dev --actions read,update --resources config:auth:gcp-dev --subjects users:developer1@thycotic.com
Copy
created: '2020-06-24T18:12:26Z'
createdBy: users:thy-one:admin@company.com
id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
lastModified: '2020-07-16T20:13:53Z'
lastModifiedBy: users:thy-one:admin@company.com
path: config:auth:gcp-dev
permissionDocument:
- actions:
  - read
  - update
  conditions: {}
  description: ""
  effect: allow
  id: xxxxxxxxxxxx
  meta: null
  resources:
  - config:auth:gcp-dev
  subjects:
  - users:developer1@thycotic.com
version: "0"

Create Reports

Case: A user needs to be able to read reports

Solution: Add a policy for the reports:query resource path

The command to create this policy is

Copy
dsv policy create --path report:query --subjects users:user1@organization.com --actions create --effect allow --resources report:query
Copy
{
  "path": "report:query",
  "permissionDocument": [
    {
      "actions": ["create"],
      "conditions": {},
      "description": "",
      "effect": "allow",
      "id": "c23f8...h0hfgg",
      "meta": null,
      "resources": ["report:query"],
      "subjects": ["users:user1@organization.com"]
    }
  ],
  "version": "0"
}