Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Audit log of read access #243

Closed
jampukka opened this issue Feb 16, 2021 · 2 comments
Closed

Audit log of read access #243

jampukka opened this issue Feb 16, 2021 · 2 comments

Comments

@jampukka
Copy link
Member

Currently there's no way to produce an audit log of read access to layers with non-public or sensitive information. As the requirements and use cases may vary between different services and or instances of Oskari I suggest we add a mechanism to oskari-server that server-extensions can then hook into. It is safe to assume such layers to be configured with username and password set so all access to them gets proxied through oskari-server. The described functionality should add minimal overhead to instances of Oskari that don't need it.

In addition we probably need to "warn" the user before opening (enabling) such a layer so that user understands that the action will be logged, but this can probably be done totally on frontend extensions.

@ZakarFin
Copy link
Member

Sounds good to me

@ZakarFin
Copy link
Member

ZakarFin commented Mar 8, 2021

Initial hook enabler added in 2.2.0

@ZakarFin ZakarFin closed this as completed Mar 8, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants