Skip to content

Authorising users for access to a service

Helmholtz AAI allows multiple ways to manage authorisation of users and user groups, as well as various ways of transmitting these information to services.

Warning

All these methods can be combined, which can easily result in highly complex or even chaotic authorisation schemas if not planned well beforehand. If you as a service provider plan to establish a non-trivial authorisation schema to heterogenous user groups, please check the following methods carefully, and, if in doubt, contact us to discuss optimal ways of implementation.

Project-specific user groups

Users can be organised in hierarchical (tree-topology) groups - dubbed “Virtual Organisation (VO)”. VOs allow to provide services fine-grained information on entitlements of users, as well as distributing the work load of user management to multiple sub-group managers, if needed.

The information is transmitted via group claims. This and the already registered VOs are listed here.

Organisation-specific user groups

Organisation-specific groups (VOs) are currently supported for all Helmholtz Centres and Helmholtz as whole. This allows to identify a user automatically as a member of a supported organisation, if the respective organisation’s IdP provides sufficient information. The list of currently supported organisations can be found here. For example, any full member of a Helmholtz organisation can be identified via the claim urn:geant:helmholtz.de:group:Helmholtz-member.

Organisation-hierarchy user groups

Organisation-hierarchy groups (VOs) are currently supported by some Helmholtz Centres. This allows to identify a user automatically as a member of a supported unity within the organisation, if the respective organisation’s IdP provides sufficient information. The list of currently supported organisations can be found here.

Resource capabilities

If the user is not member of a specific VO but is allowed to use a service, this is provided in information on entitlements of users. This information is transmitted via the res claim. In most cases, the entitlement value is defined by the service, expressed by the user’s organisation and forwarded by the Helmholtz AAI.

Assurance

IdPs can provide elevated assurance on the identity of the logged-in user, for example stating that a photo ID has been checked and/or that multi factor authentication is employed. This is expressed by the user’s organisation and forwarded within the Helmholtz AAI as assurance in corresponding claims as described here. If the organisation provides only the assurance information but not the fulfilled profiles, the Helmholtz AAI adds the profile information.