blob: 722e86b4ec5186c6a0bcb272ab02cc3b223dd1a1 [file] [log] [blame]
Bin Yang3638c462018-07-25 08:11:58 +00001..
2 This work is licensed under a Creative Commons Attribution 4.0
3 International License.
4
5======================================================
6MultiCloud security enhancement: secured communication
7======================================================
8
9To support an ONAP Non-Functional Requirement with regarding to Security: "All internal/external system communications shall be able to be encrypted", MultiCloud project needs to explore the best way to implement it.
Bin Yang3638c462018-07-25 08:11:58 +000010..
11https://wiki.onap.org/display/DW/Casablanca+Release+Requirements#CasablancaReleaseRequirements-NonFunctionalRequirements
12
13Problems Statement
14==================
15
16By default all MultiCloud micro-services expose APIs with non-secured endpoints. To fulfill the ONAP security requirement above, either MultiCloud integrate with AAF's CADI SDK or leverage some other technology.
17 - Integration with AAF's CADI is preferred by the security subcommittee, however, this requires AAF team or someone provides CADI SDK in python binding. So far there is no promising resource to do that and no roadmap yet.
18 - On the other hands, ISTIO's security feature could fulfill this requirement very well without imposing any modification of MultiCloud source code. MSB project team is exploring the way to implement it for OOM based ONAP deployment.
19
20
21One caveat is that ISTIO approach is only applicable to OOM based ONAP deployment. Hence the question would be:
22Whether we should implement this feature for HEAT based ONAP deployment? And if yes, how?
23
24Proposed Solutions
25==================
26
271, **With respect to HEAT based ONAP deployment**:
28
29Given the consensus achieved during ONAP Casablanca Forum, HEAT based ONAP deployment is only for Integration test,
30and the fact that many other features are only applicable to OOM based ONAP deployment, I do think it does not hurt to decide
31that MultiCloud enable this security feature only for OOM based ONAP deployment.
32So the answer to the questions above would be: We will not implement this security feature for HEAT based ONAP deployment
33
342, **With respect to OOM based ONAP deployment**:
35
36it is intended that MultiCloud project will collaborate with MSB project and VFC project to implement this security feature with the approach of ISTIO.
37
38MultiCloud does not need to change anything, but need to pay attention to following facts:
39 - The deployment of the PODs of micro-services: MSB,VFC,MultiCloud will be deployed into seperated kubernetes namespace other than the one for those not utilizing ISTIO features.
40 - All communication across different kubernetes namespace should use either IP or FQDN (Full Qualified Domain Name)
41
42
43Test Use Cases
44==================
45
46The pariwise and integration testing will be conducted between VFC and MultiCloud in context of VoLTE or vCPE use case.
47