Your data in Couchbase just got more secure.

Couchbase Server 7.0 introduced Scopes and Collections to better map between relational and NoSQL data models. But the 7.0 release also includes some additional enhancements to strengthen the security of the data platform. More specifically, role-based access control (RBAC) security is now supported at the level of individual Scopes and Collections.

What’s all this mean for your Couchbase deployments? Let’s dive in.

Existing RBAC Security Roles in Couchbase

Couchbase Server has allowed fine-grained controls of user access to the platform with role-based access control (RBAC) security for administrators since version 4.5 and for all users since version 5.0. Couchbase Collections were introduced as a developer preview feature in Couchbase Server 6.5 and are now fully supported in Couchbase Server 7.0.

Couchbase RBAC security roles were previously divided into two categories:

    • Administration and Global: These roles are associated with cluster-wide privileges. Some of these roles are for administrators who might manage cluster-configurations, read statistics or enforce security. Others are for users and user-defined applications that require access to specific, cluster-wide resources.
    • Per Bucket: These roles are associated with one or more Buckets and support the reading and writing of Bucket settings, access to data, and the management of services, indexes, and replication procedures.

An RBAC Example Using Scopes and Collections

For example, you may have given read access to a Bucket named Travel to a trusted hotel search engine called Acme Co. with a user named acme using a command like this in the command-line interface of a Linux-based cluster. (You may need to adjust the paths if using another platform.)

What this would do is allow your hotel search partner Acme Co. to access all of the data your company is storing in the Travel Couchbase Bucket. This might include orders, inventory and other pieces of data for not only hotels but also airlines and other travel products. Following the principle of least privilege, what if we wanted to limit what data Acme Co. has access to, instead of allowing them access to todos travel data in our company?

Collections allow JSON documents in a Couchbase Bucket to be organized, first into Scopes, where a Scope is similar to a schema in a relational database (RDBMS). Next, the Scope is subdivided into individual Collections, similar to how a table would be structured in a traditional relational database.

The namespace within each Scope is independent of others, hence you can have the same Collection names within different Scopes. Similarly, document keys need to be unique only within a Collection and hence documents with the same key can exist in different Collections.

Before the introduction of Scopes and Collections, it was common to organize Couchbase documents based on key prefixes, such as Orders::Europe::Customer1. Collections provide much more flexibility in the document keys than was previously available.

Below is a visual diagram of the relationship between Buckets, Scopes and Collections for an example travel dataset.

Buckets, Scopes and Collections within Couchbase

For seamless upgrades – and for backwards compatibility – every Bucket now has a Padrão Scope, and the Padrão Scope has a Padrão Collection. The Padrão Collection provides backward compatibility and a direct reference to the Bucket automatically maps to the Padrão Collection. Also, on upgrade, all existing data is automatically added to the Padrão Collection.

Enquanto o Padrão Collection is provided as a backward compatibility mechanism, new applications should be written using named Collections. As you can see, Collections allow for additional options to organize data in a Servidor Couchbase cluster.

Returning to the example above, what if we wanted to only allow Acme Co. to see the hotel data only, instead of all travel data across the company? With Collections, you can now limit the confines of Acme’s access to only the Scope of your choosing.

For example, say Acme Co. needed to check the inventory of available hotel rooms, we can narrow their RBAC role down to the Hotel Collection inside the Inventory Scope within the Travel Balde.

Role-Based Access Control (RBAC) Security Explained

How do Scopes and Collections work with role-based access control in the database?

A user who has access to a Bucket inherits access to the children Scopes and Collections of that Bucket. Likewise, a user who has access to a Scope inherits access to the children Collections but not the parent Bucket.

Here’s a breakdown of how the new role-based security works with Collections:

Role Descrição
data_reader[*] Can read data in every Bucket, including every Scope and Collection, cluster-wide.
data_reader[foo] Can read data in every Scope and Collection within only the Bucket foo.
data_reader[foo:bar] Can read data in every Collection within the Scope bar of the Bucket foo.
data_reader[foo:bar:baz] Can read data only in the Collection baz which is located in the Scope bar of the Bucket foo.
Role-based access control on Couchbase Scopes and Collections Example An example of RBAC security on Scopes and Collections in Couchbase

For Acme Co, the CLI command is similar to the earlier example, but instead of setting the RBAC to a Bucket, you need to adjust it to allow only a single Scope and/or Collection.

In our example from above, we want to allow the acme user access to the Hotel Collection inside of the Inventory Scope, so in this case the role would be data_reader[Travel:Inventory:Hotel].

You’re probably wondering, what user access roles that can have a Scope and Collection defined? Here’s the complete list:

  • Application Access
  • Data Reader
  • Data Writer
  • Data DCP Reader
  • Data Monitoring
  • Full-Text Search (FTS) Reader
  • Query Select
  • Query Update
  • Query Insert
  • Query Delete
  • Query Manage Index
  • Analytics Select
  • We’ve also added a Manage Collections in Scope role to allow a user to add and remove Collections in a specific Scope on a Bucket.
  • A Hands-on RBAC Security Example with Couchbase Server 7.0

    Now it’s time for some more hands-on examples you can try out for yourself on Couchbase Server 7.0. As before, I’m using a Linux-based cluster, so you may need to adjust the paths if using another platform. You’ll need to be running the Couchbase Data, Query and Index Services for this example.

    First, load the amostra de viagem Bucket into your cluster.

    Then, create some additional Collections in the Bucket. We’ll use the Padrão Scope. You’ll need to use a Bucket administrator user (or higher privileges) to create the new Collections.

    You can also see these Collections in the Couchbase Server Web UI, as pictured below.

    Screenshot of Couchbase Server 7.0 Buckets

    The Bucket view in Couchbase Server 7.0

    Couchbase Server 7.0 Scopes and Collections Screenshot

    The Scopes and Collections view in Couchbase Server 7.0

    Next, we’ll load data into each of the Collections based on a field which already exists in the documents, called tipo. The document tipo field matches to the new Collections we’ve just created. The data is copied into the Collection using the N1QL query language from the command line. Observação: We need to be careful to escape characters the shell would try to execute such as backticks.

    If you run into any issues with the formatting or getting the command to run, here’s an example image of what the command should look like.

    Screenshot of N1QL query for Hotel Collection Populate

    Let’s create a primary index on the hotel Collection as an administrator:

    Now, let’s get a list of all users and roles:

    As you can see above, we currently only have the built-in Administrator and no additional users. So the output from the command is empty, as expected.

    Next, let’s create a user, John Doe. We’ll give John both a data reader role and a query select role on the hotel Collection, which is located in the Padrão Scope.

    Again, you can do this from the Web UI as well.

    Couchbase Server 7.0 screenshot of user roles

    RBAC User Roles in Couchbase Server 7.0

    Then, we verify that John Doe has the permissions specific to the hotel Collection. When John attempts to read from the entire travel-sample Bucket, he gets a permission denied error.

    This time, as John, let’s select five hotels from just the hotel Collection of the amostra de viagem Bucket, which John faz have access to.

    As shown in the examples above, you can qualify a Data Reader and Query Select role with a Scope and Collection confinement.

    Have fun and secure your Collections with our new role-based access control functionality!

    More Resources on the Couchbase 7.0 Release

    Want to try out RBAC security in Couchbase for yourself?
    Give Couchbase a Spin Today

     
     
     

    Autor

    A ordem da postagem em relação a outras postagens. Ian McCloy, diretor de gerenciamento de produtos

    Ian McCloy é diretor do grupo de gerenciamento de produtos de plataforma e segurança da Couchbase e mora no Reino Unido. Sua equipe dedicada é responsável pela arquitetura de confiabilidade, disponibilidade, capacidade de serviço e segurança do Couchbase Server e do banco de dados SaaS, Capella. Essa equipe também é proprietária de plataformas nativas da nuvem, como o Operador Autônomo Kubernetes do Couchbase. Ian tem uma vasta experiência como engenheiro de software, engenheiro de suporte técnico, engenheiro de garantia de qualidade e administrador de sistemas. Ian liderou equipes técnicas globais durante a maior parte de sua carreira profissional de 20 anos e possui várias patentes nas áreas de segurança da informação, virtualização e design de hardware. https://www.linkedin.com/in/ianmccloy/

    3 Comentários

    1. Hi~ Thank you for your post.
      I think there’s a typo here, so I’m leaving a comment.
      //
      Let’s create a user, John Doe who has a data reader and query select role on the hotel collection, which is located in the _default collection.
      //

      I think _default Collection >>> _default Scope

      It’s right?

      Once again, thank you for your helpful post.

    2. Hi

      Can you confirm that “Application Access” can have a Scope and Collection defined?

      From the documentation Application Access translates to full_bucket_access and is deprecated and when I tried it only bucket name was supported.

      Cannot assign roles to user because the following roles are unknown, malformed or role parameters are undefined: [bucket_full_access[travel-sample:inventory]]”

    Posição vertical a partir do topo para iniciar o corte como uma porcentagem da altura da imagem.