Configuring Access Control in EE and FE
Role-based Access Control (RBAC) is a security feature of Aerospike Database Enterprise Edition (EE), and the FIPS 140-2-compliant Aerospike Database Enterprise Edition for United States Federal (FE). RBAC allows you to manage users, roles and privileges, and enable audit trail logging of security events.
Aerospike EE supports several authentication modes. Internal users are created within Aerospike EE and authenticated with a password or a certificate using Public Key Infrastructure (PKI) auth. External users are defined in an LDAP server and authenticated against it. Refer to Overview of Access Control with LDAP and PKI for details.
Requirementsโ
Aerospike Database versionsโ
You can enable RBAC in Aerospike EE through a rolling restart in versions later than 4.6.0.4 (and also in 4.5.3.6, 4.5.2.6, 4.5.1.11, and 4.5.0.15).
During a rolling restart activation of RBAC, some nodes in the cluster authenticate the clients and some don't yet. Verify that your client versions supports this mixed environment prior to initiating the rolling restart.
Aerospike Admin (asadm
) added support for mixed security modes in tools package 7.0.0 and asadm
2.7.0
Client requirementsโ
The table below displays the minimum client version for the following security features:
Client | RBAC support | LDAP support (Database 4.6) | Rolling restart to enable RBAC | PKI auth support (Database 5.7) |
---|---|---|---|---|
Java | 3.1.2 | 4.1.6 | 4.4.4 | 5.1.8 |
C | 3.1.16 | 4.3.11 | 4.6.5 | 5.2.3 |
C# | 3.1.2 | 3.6.4 | 3.8.2 | 4.2.3 |
Go | 1.3.0 | 1.35.1 | 2.3.0 | 5.6.0 |
Python | 1.0.44 | 3.2.0 | 3.7.3 | 6.1.0 |
Node.js | 1.0.35 | 3.3.0 | 3.12.0 | 4.0.5, 5.0.3 |
Ruby | 1.0.0 | - | - | - |
Rust | 1.1.0 | - | - | - |
Security features by versionโ
- Database 6.3: Removed the
syslog
subcontext of thesecurity
config context. Audit trail messages can be sent to any log sink type (file
,console
orsyslog
) that is defined in thelogging
config context. - Database 6.0: The FIPS 140-2 compliant "Federal Edition" variant of Aerospike EE restricts access to PKI or LDAP authentication modes.
- Database 5.7: Added PKI auth as an alternative authentication mode for internal users (users created in Aerospike). You can restrict an internal user to PKI authentication by generating a strong random password for the user and not communicating it to them. Create a user normally with
asadm
, then generate an SSL cert for the user, signed by the server's root CA. The server must be configured for Mutual TLS (mTLS).
When access control is enabled with Cross-Datacenter Replication (XDR), a cluster with Aerospike EE 4.1.0.1 to 4.3.0.6 cannot ship to an Aerospike EE Database 4.6 or later. The simplest workaround is to avoid using incompatible Aerospike EE versions (4.1.0.1 to 4.3.0.6). Refer to this support article for more information.
Enable access controlโ
In a running cluster, apply the following steps node-by-node. If the node isn't running, skip to step (3):
In the configuration file (
aerospike.conf
), verify that asecurity
stanza is present.a. In Database 5.7 or later, the presence of a
security
stanza enables security and access control. The server does not recognizeenable-security
and will not start if it is present.b. Prior to Database 5.7, in the
security
stanza, setenable-security
totrue
to enable security and access control.Optionally, to enable rate quotas, set
enable-quotas
totrue
in thesecurity
stanza.
security {
# enable-security true # versions < 5.7 only
enable-quotas true
# Other security-related configuration...
}
You can change the default password for the admin user by editing the configuration parameter default-password-file
which was introduced in Aerospike Database 7.1.
Verify that access control is enabled on the cluster. Use
asadm
to connect to the server.
- Aerospike EE: Log in with the default username admin and password admin.
- Federal Edition: An admin user needs to create and sign the certificate. Refer to create a user certificate request.
- Use
asadm -U USERNAME
to change the password. ReplaceUSERNAME
with your username. For example:
asadm -U admin
Privilegesโ
A privilege consists of permissions and a scope - global, per namespace, or per set within a specified namespace. A role is a collection of scoped privileges, and roles are granted to users. Privileges are a fundamental unit of RBAC, and cannot be modified.
Privilege | Permission | Scope |
---|---|---|
read | - Get record - Scan - Query - Get server configuration and statistics - Change user password | Global, per namespace, or per set in a namespace. |
write (Database 4.6+) | - Record-level write operations (put, touch, delete) -Bin-level write operations (such as List or Map write operations) - Truncate or undo a truncation of namespaces or sets (Database 5.1 - 5.7) | Global, per namespace, or per set in a namespace. |
read-write | - All read user role privileges - All write user role privileges | Global, per namespace, or per set in a namespace. |
read-write-udf | - All read-write user role privileges - Execute User-Defined Functions (UDFs) - Execute queries using UDFs | Global, per namespace, or per set in a namespace. |
truncate (Database 6.0+) | - Truncate or undo a truncation of namespaces or sets | Global, per namespace, or per set in a namespace. |
data-admin | - Create and drop secondary indexes - Register and remove UDFs - Use the scan-query job monitoring system - Abort scans and queries - Change user password - Truncate or undo a truncation of namespaces or sets | Global |
sindex-admin (Database 6.0+) | - Create and drop secondary indexes | Global |
sys-admin | - All data-admin role privileges - Set dynamic server configuration variables - Enable specialized logging - Get server configuration and statistics | Global |
udf-admin (Database 6.0+) | - Register and remove UDFs | Global |
user-admin | - Create and drop users - Change any user password - Grant roles to users - Revoke user roles - Create and drop user roles - Grant user role privileges - Revoke role privileges - Set allowlists for roles - Set read/write rate quotas for roles - Query all users and their roles - Query all roles and their privileges - Get server configuration and statistics | Global |
Rolesโ
For instructions on using asadm
to manage roles and users, refer to Create users and assign roles.
Pre-defined rolesโ
Aerospike provides pre-defined roles corresponding with each privilege. Each
has a name matching the single privilege, such as read-write
.
Pre-defined roles have a global scope. They cannot be modified. They can be assigned as-is to users.
Create a roleโ
The asadm
command to create a new role is:
manage acl create role <role-name> priv <privilege> [ns <namespace> [set <set>]] [allow <addr1> [<addr2> [...]]] [read <read-quota>] [write <write-quota>]
Exampleโ
manage acl create role superusers priv read-write-udf
Add a privilege to a roleโ
The asadm
command to add a privilege to a role is:
manage acl grant role <role-name> priv <privilege> [ns <namespace> [set <set>]]>
Exampleโ
manage acl grant role demo-users priv read-write-udf ns test set demoset
Remove a privilege from a roleโ
The asadm
command to remove a privilege from a role is:
manage acl revoke role <role-name> priv <privilege> [ns <namespace> [set <set>]]>
Exampleโ
manage acl revoke role demo-users priv read-write-udf
Add an IP address to a role's allowlistโ
The asadm
command to add an IP address or range to a role's allowlist is:
manage acl allowlist role <role-name> allow <addr1> [<addr2> [...]]
Examplesโ
manage acl allowlist role superusers allow 10.0.0.1
manage acl allowlist role demo-users allow 127.0.0.0/8
Clear a role's allowlistโ
The asadm
command to clear an allowlist from a role is:
manage acl allowlist role <role-name> clear
Exampleโ
manage acl allowlist role demo-users clear
Delete a roleโ
The asadm
command to delete a role is:
manage acl delete user <username>
Exampleโ
manage acl delete role demo-users
Usersโ
Default admin userโ
When RBAC is first enabled in an Aerospike EE cluster, it comes with a default admin user that has the permissions to create new users.
- In Aerospike EE the default username is
admin
. The default password isadmin
. You can change the default password for the admin user by editing the configuration parameterdefault-password-file
which was introduced in Aerospike Database 7.1. - In Aerospike Federal Edition password authentication is disabled. You must create and sign a TLS certificate for the admin user, in order to use PKI authentication. Refer to create a user certificate request.
Set a new passwordโ
The asadm
command to set a password for an existing user is:
manage acl set-password user USERNAME [password PASSWORD]
In tools package 7.1.1 (asadm 2.8.1) and earlier, asadm (formerly performed in aql
) limits the characters you can use when setting a password.
Valid passwords can contain alphanumeric characters and the symbols .*-:/_{}@
. White space is not supported.
When setting a user password with a hidden prompt these restrictions do not apply.
Exampleโ
manage acl set-password user admin
Create a userโ
The asadm
command to create a user is:
manage acl create user <username> [password <password>] [roles <role1> <role2> ...]
Examplesโ
manage acl create user alice password alicepass roles superusers
manage acl create user bob password bobpass roles user-admin demo-users aaargh-users
Grant a role to a userโ
The asadm
command to add one or more roles to a user is:
manage acl grant user <username> roles <role1> [<role2> [...]]
Examplesโ
manage acl grant user alice roles superusers
manage acl grant user bob roles user-admin demo-users aaargh-users
Revoke a user's roleโ
The asadm
command to revoke one or more roles previously granted to a user is:
manage acl revoke user <username> roles <role1> [<role2> [...]]
Examplesโ
manage acl revoke user alice roles superusers
manage acl revoke user bob roles user-admin demo-users
Delete a userโ
The asadm
command to delete a user is:
manage acl delete user <username>
Exampleโ
manage acl delete user jdoe
PKI authenticationโ
For PKI authentication:
- Verify that the server is using Mutual TLS (mTLS). If it is not, refer to TLS Configuration for configuration instructions.
- Create a user and grant them privileges and roles.
- Generate an SSL certificate for the user, with the username as the Common Name
CN
. - Sign the certificate using the server
root
certificate authority (CA). (Refer to create a user certificate request.)
If you are using Aerospike Federal Edition (FE) you cannot use password authentication. Use PKI authentication or LDAP, which are available for both EE and FE.
Exampleโ
asadm -p 4333 --tls-enable --tls-name server \
--tls-certfile=/root/rootca/output/admin.pem --tls-keyfile=/root/rootca/output/admin.key \
--tls-cafile=/etc/aerospike/tls/server/rootCA.pem --auth=pki
Protecting SMD filesโ
The /opt/aerospike/smd/security.smd
file stores sensitive information about users and roles. For security reasons, we recommend you secure this file and restrict the permissions.
As of tools 5.2.0, the default permission on all SMD files grants read access to everyone. To secure the file, change the permissions of the /opt/aerospike/smd
directory and its contents.
- Set permissions on the
/opt/aerospike/smd
directory:
chmod 700 /opt/aerospike/smd
- Set permissions on the
/opt/aerospike/smd/security.smd
file:
chmod 600 /opt/aerospike/smd/security.smd
- Optional: Use
chmod 600
to restrict permissions on other SMD files you want to protect in the/opt/aerospike
directory.
chmod 600 /opt/aerospike/smd/FILENAME
Replace FILENAME
with the name of the file you want to protect.
- To verify permissions in the
/opt/aerospike
directory, list its contents:
ls -la /opt/aerospike/
Expected output after permissions are set:
drwxr-xr-x 1 aerospike aerospike 4096 Apr 24 13:17 .
drwxr-xr-x 1 root root 4096 Apr 24 13:17 ..
drwxr-xr-x 2 aerospike aerospike 4096 Apr 24 13:17 bin
drwxr-xr-x 2 aerospike aerospike 4096 Nov 10 2020 data
drwxr-xr-x 2 aerospike aerospike 4096 Apr 24 13:17 doc
drwxr-xr-x 4 aerospike aerospike 4096 Apr 24 13:17 lib
drwx------ 1 aerospike aerospike 4096 Jun 22 12:26 smd <<<<
drwxr-xr-x 3 aerospike aerospike 4096 Apr 24 13:17 usr
- To verify permissions in the
/opt/aerospike/smd
directory, list its contents:
ls -la /opt/aerospike/smd
Expected output after permissions are set:
drwx------ 1 aerospike aerospike 4096 Jun 22 12:26 .
drwxr-xr-x 1 aerospike aerospike 4096 Apr 24 13:17 ..
-rw-r--r-- 1 root root 292 Jun 22 10:12 sindex.smd
-rw-r--r-- 1 root root 289 Jun 22 12:26 truncate.smd
-rwx------ 1 root root 289 Jun 22 12:26 security.smd
Audit trailโ
You can configure Aerospike EE to log security events to an audit log. Each cluster node has a separate audit trail. Refer to Configuring Log Streams for more information.
Aerospike supports an audit trail with granular control over the type of security events being logged:
- Security violations (including authentication or role violations).
- Successful authentications.
- Successful or attempted data operations (including various write/read operations).
- User administration operations, including:
- Creating/removing users.
- Granting/revoking user roles.
- Creating/removing roles.
- Granting/revoking role privileges.
- System administration operation including:
- Creating/removing secondary indexes.
- Registering/removing UDFs.
- Changing dynamic server configurations.
In general, auditing security violations and other rare events have minimal performance impact. However, logging every attempted or successful data operation on numerous data sets can slow runtime performance in systems under heavy load. This level of logging also increases storage requirements for the logs.
If you plan to maintain extensive audit records, we suggest you review potential performance impact and storage needs in a test environment first.
Generalโ
- Security violations, refer to report-violation.
Authenticationโ
- Authentication failure, refer to report-violation.
- Successful authentications, refer to report-authentication.
- Successful data transactions, refer to report data transactions.
Usersโ
- Role violation, report violation.
- User administration operations, refer to report user admin:
- Create or drop user.
- Change user password.
- Grant roles to user.
- Revoke roles from user.
- Create or drop role.
- Grant privileges to role.
- Revoke privileges from role.
- Set allowlist for role.
- Set read/write rate quotas for role.
- Query users and their roles.
- Query roles and their privileges.
System administrationโ
- System administration operations, refer to system-administration:
- Create or drop index.
- Register or remove UDFs.
- Set dynamic server configuration variables.
- Enable specialized logging.
- Get server configuration, server statistics, and other information.
Configuring the audit trail in Database 6.3 and laterโ
Starting with 6.3, any log message (including the audit logging context) can be sent to any log sink, including syslog-compatible socket
log sinks.
Therefore, the syslog
subcontext of the security
configuration context has been removed. The following shows how to configure an audit trail starting with Database 6.3.
security {
log {
report-authentication true
report-user-admin true
report-sys-admin true
report-violation true
report-data-op test demoset # report successful data transactions on set "demoset" in namespace "test"
}
}
The logging
configuration context defines log sinks, with each
having the ability to filter log messages by context and level.
Logging audit trail messages to a syslog-compatible socketโ
Combined with the configuration above, audit
context log messages will be sent
to the local0 syslog facility.
logging {
syslog {
facility local0
tag aerospike-audit
context any critical
context audit info
}
}
Configuring the audit trail in versions prior to Database 6.3โ
Turning on the audit trail is done in the security
configuration context.
For details about these configuration parameters, refer to the Configuration Reference.
Logging audit trail messages to file sinksโ
The following configuration sends audit trail messages to the file
log sinks defined in the logging
configuration
context, where log messages can be filtered by message context and log level.
security {
log {
report-authentication true
report-user-admin true
report-sys-admin true
report-violation true
report-data-op test demoset # report successful data transactions on set "demoset" in namespace "test"
}
}
Logging audit trail messages to syslogโ
Prior to Database 6.3, only audit trail log messages could be sent to syslog,
through a special configuration of the security
config context. Destinations
included:
- Local syslog facility (local file)
- Syslog daemon default sink
security {
syslog {
local 0 # write to "local0" facility
# write audit trail messages to the default syslog facility
report-authentication true
report-user-admin true
report-sys-admin true
report-violation true
report-data-op test demoset # report successful data transactions on set "demoset" in namespace "test"
}
}
The following example configures rsyslog
to send locally written audit information to syslog, with the following line added to /etc/rsyslog.conf
:
local0.** /var/log/aerospike_security_audit.log
Then restart rsyslogd.
Parsing audit trail log messagesโ
The log message says in plain text what security action was attempted (if any), whether it succeeded or failed, and which user (if any) was involved.
Namespaces and sets are in braces: {namespace|set}
or just {namespace|}
Custom role privileges are letter codes that correspond to Aerospike pre-defined privileges, and are followed by {namespace|set}
scoping (if applicable).
The letter codes are:
r
= readrw
= read-writerwf
= read-write-udft
= truncatew
= writed
= data-admin (a global privilege, scoping not applicable).fa
= udf-admin (a global privilege, scoping not applicable).ia
= sindex-admin (a global privilege, scoping not applicable).s
= sys-admin (a global privilege, scoping not applicable).u
= user-admin (a global privilege, scoping not applicable).
For example:
rw{}
indicates read-write privileges across all namespaces.r{test},rw{ns2}
indicates read privileges for thetest
namespace and read-write privileges for thens2
namespace.u,rwf{test|demoset}
indicates user-admin privileges as well as read-write-udf privileges fordemoset
in thetest
namespace.
If the key is stored, key data is logged with successfully-authenticated data transactions and data transactions that fail due to role violations. If the key is not stored, the digest is logged. The eventual success or failure of the transaction does not affect this behavior, since logging happens at the point at which authentication is checked.
Key data appears as:
[S|mykey]
if the key is a string.[I|78654]
if the key is an integer.[B|AA C5 48]
if the key is a blob of bytes.
If the key is not stored, the digest is logged as a string:
[D|567895f996dd7dd3832222b57cd4a3031ecc6e24]
Exampleโ
The following is an example of audit trail output.
In Database 5.7 or later, the logging context for the audit trail output is "audit":
Expected output:
Sep 01 2021 18:37:56 GMT: INFO (audit): (security.c:7608) permitted | client: 127.0.0.1:51378 | authenticated user: user2 | action: login | detail: user=user2
Sep 01 2021 18:37:56 GMT: INFO (audit): (security.c:7608) permitted | client: 127.0.0.1:51380 | authenticated user: user2 | action: authentication | detail: user=user2
Sep 01 2021 18:37:56 GMT: INFO (audit): (security.c:7608) permitted | client: 127.0.0.1:51380 | authenticated user: user2 | action: read | detail: {test|eg-set} [D|1142f0217ababf9fda5b1a4de66e6e8d4e51765e]