Menu

Who are you? Authentication and authorisation in RabbitMQ 2.3.1

RabbitMQ 2.3.1 introduces a couple of new plugin mechanisms, allowing you much more control over how users authenticate themselves against Rabbit, and how we determine what they are authorised to do. There are three questions of concern here:

  1. How does the client prove its identity over the wire?
  2. Where do users and authentication information (e.g. password hashes) live?
  3. Where does permission information live?

Question 1 is answered in the case of AMQP by SASL - a simple protocol for pluggable authentication mechanisms that is embedded within AMQP (and various other protocols). SASL lets a client and a server negotiate and use an authentication mechanism, without the "outer" protocol having to know any of the details about how authentication works.

SASL offers a number of "mechanisms". Since the beginning, RabbitMQ has supported the PLAIN mechanism, which basically consists of sending a username and password over the wire in plaintext (of course possibly the whole connection might be protected by SSL). It's also supported the variant AMQPLAIN mechanism (which is conceptually identical to PLAIN but slightly easier to implement if you have an AMQP codec lying around). RabbitMQ 2.3.1 adds a plugin system allowing you to add or configure more mechanisms, and we've written an example plugin which implements the SASL EXTERNAL mechanism.

The SASL EXTERNAL mechanism basically says "somehow determine the user's identity by some mechanism outside the context of the protocol". In rabbitmq-auth-mechanism-ssl we take this to be SSL. When this plugin is installed and enabled, clients can connect without supplying a username and password if they connect with SSL and present a client certificate which is trusted by the server's CA. In this case we take the username to be the Common Name of the certificate presented. As long as that username exists, they are let in.

But does that username exist? And what permissions are recorded against it? This is where we face up to questions number 2 (aka authentication) and 3 (aka authorisation).

Again, since the beginning, RabbitMQ has contained an internal database of users and permissions, managed though rabbitmqctl, and more recently the management plugin. And again, RabbitMQ 2.3.1 adds a plugin system that allows you to augment or replace this database.

And again, we've written a plugin to do something interesting. rabbitmq-auth-backend-ldap lets you authenticate your users and check authorisation against an LDAP database. This can entirely replace the built in database, or just augment it. Configuring this plugin for authentication is (relatively) easy once you have an LDAP server up and running; you provide a template Distinguished Name for all your users (so that for example a user logging in as "guest" might have the DN "cn=guest,ou=People,dc=example,dc=com", and the plugin will attempt to bind to the LDAP server to check if they can log in. Easy!

Configuring the plugin for authorisation is hard though. Well, complicated. The problem is that LDAP has no ideas about how permissions should work in an AMQP broker (horrendous oversight!) and so we need to decide on some rules ourselves. The README-authorisation documents how this works in some detail, but in short there is a simple hierarchical query mechanism which lets you build queries against the LDAP database. For example:

{vhost_access_query, {exists, "ou=${vhost},ou=vhosts,dc=example,dc=com"}}

is a simple query which determines whether LDAP users can see a virtual host based on whether a corresponding Organisational Unit exists in LDAP, while:

{resource_access_query,
 {for, [{resource, exchange,
         {for, [{permission, configure,
                 { in_group, "cn=wheel,ou=groups,dc=example,dc=com" } },
                {permission, write, {constant, true}},
                {permission, read,  {constant, true}}
               ]}},
        {resource, queue, {constant, true}} ]}}

is a more complex query which would allow members of the "wheel" group to declare and delete exchanges, and allow all users to do everything else.

So, what do you think? Is this useful to you? How could it be improved?

Tags: , ,

2 Responses to “Who are you? Authentication and authorisation in RabbitMQ 2.3.1”

  1. Peet Denny Says:

    Wow, these are seriously fast; we're able to publish 1 million persistent 2k messages to a remote queue in less than 3 mins. Nice one :)
    (We're using 2.3.1, I hear that 2.4 is even faster)

    Now we have the interesting problem that our producers are actually faster than our consumers (1 million in 6 mins)
    Would you recommend getting our producer to back off, to slow down when unacknowledged messages go above a certain number, or is there a way that we can get our consumers to go faster?

    Cheers

  2. Simon MacMullen Says:

    Hi Peet! Did you mean to reply to the post at http://www.rabbitmq.com/blog/2011/02/10/introducing-publisher-confirms/ ?

    Anyway, the standard advice here is to stop publishing and wait when the number of unacknowledged messages gets beyond a certain point.