July 28, 2023 Architecture Team Meeting Notes

Attendees

@Aare Laponin

@Oleksii Danyliuk

@Taylor Downs

@PSRAMKUMAR

@karim.jindani

@Aleksander Reitsakas

@Uwe Wahser

@Steve Conrad

Apologies

@Wes Brown

 

 

Agenda

Presenter

Duration

Discussion

Technical Reviews of BB specs

@Steve Conrad

10 minutes

Architecture team to review Wave 3 specifications: Target Friday August 11 to complete reviews

Decoupling BBs

@Steve Conrad

15 minutes

How do we handle large DPGs as BB candidates?

Finalize UX Switching

@PSRAMKUMAR

15 minutes

Finalize document and make plans to disseminate to TC and BB groups

  • Steve to update Confluence document with latest changes from Ramkumar

    • Refactor to show as sequence diagram. Use ‘application’ and ‘auth services’ nomenclature.

    • Ramkumar to update to implement API call to receive token to avoid race condition

  • 4th option is the preferred option. Implementers may choose to implement other options if they are suitable. There may be UX flows that do not require the 4th option and implementers can choose a simpler path to handoff UX.

GERA Update

@Aare Laponin @PSRAMKUMAR

15 minutes

Update on changes to GERA document and progress/next steps

  • Arch team is not actively engaged in changing this document.

  • Aare working to develop a simple overview/reference document - introduction, definitions, context, reference architecture, implementation guidelines

Capabilities/Service Blocks

@Wes Brown

15 minutes

Review service block (capabilities) template

Next steps/AOB

@Steve Conrad

5 minutes

What should we prioritize?

Future topic - Fall 2023

Manage Access Authorization to BB APIs

@Jaume DUBOIS

30 minutes

  • Types of accessors checked (human, back-end systems, apps or browser, robots, hardware, ..)

  • Granularity of access control (Building block, module, API, single API service, single API service for specific tenant or data)

From Technical Committee Meeting:

BBs should not own RBAC - the calling applications are responsible for it. 

Are we using token based authorization within the request to BB?

How to get candidates bypass its own RBAC?

  1. Superuser access to be given when merging with IM backend?

  2. Or control to switch off existing RBAC in target BBs

  3. option to have api token registered in IM at max permission level for specific member entities

  4. come up with a concrete example for this case

Action Items

  • Ramkumar to connect with Hani/Nico on infra requirements

  • Ramkumar/Steve to meet with Vasil

  • Arch team members to review UX Switching document: UX Switching

Future Topics

  • Define a standard set of APIs that are needed for any BB to indicate that they are running, configured and ready to use in the sandbox (or test harness). Do we need a BB registry?