Lamassu IoT implements authorization controls to manage access to resources and operations across the platform. This page describes the authorization model and how to configure access control.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/lamassuiot/lamassuiot/llms.txt
Use this file to discover all available pages before exploring further.
Authorization Model
Lamassu’s authorization system operates at multiple levels:API-Level Authorization
Each service endpoint validates that the authenticated identity has permission to perform the requested operation. Key concepts:- Authentication first: Authorization decisions are made after identity is established (via JWT, mTLS, etc.)
- Resource-based: Access is controlled per resource type (CAs, certificates, devices, DMSs, etc.)
- Operation-based: Different operations (read, write, delete) have different permission requirements
DMS-Level Authorization
The Device Management Service (DMS) controls which devices can enroll and which CAs can issue certificates. Authorization points:- Enrollment authorization: Which bootstrap certificates are trusted for enrollment
- CA authorization: Which CAs are allowed to issue certificates via this DMS
- Webhook authorization: External validation of enrollment requests
Security Schemes
Lamassu APIs use the following security schemes defined in OpenAPI specifications:Bearer Authentication
All REST APIs support JWT bearer token authentication:Client Certificate Authentication
For EST operations and device communication:Resource-Level Access Control
Lamassu services implement access control at the resource level:Certificate Authority (CA) Access
Operations:GET /cas- List certificate authoritiesPOST /cas- Create new CAGET /cas/{id}- Get CA detailsDELETE /cas/{id}- Delete CAPOST /cas/{id}/sign- Sign data with CA key
- CA creation may require elevated privileges
- CA deletion should be restricted to administrators
- Signing operations require specific CA access
Device Management Access
Operations:GET /devices- List devicesPOST /devices- Create deviceGET /devices/{id}- Get device detailsPATCH /devices/{id}- Update device metadataDELETE /devices/{id}- Decommission device
- Device creation may be restricted to provisioning services
- Metadata updates may require ownership validation
- Decommissioning should be audited and restricted
DMS Management Access
Operations:GET /dms- List DMS instancesPOST /dms- Create DMSGET /dms/{id}- Get DMS configurationPATCH /dms/{id}- Update DMS settingsDELETE /dms/{id}- Delete DMS
- DMS creation requires platform administrator privileges
- DMS configuration changes affect enrollment policies
- Validation CA list changes impact trust boundaries
DMS Authorization Configuration
Validation CA Configuration
The DMS validates client certificates against a list of trusted CAs during EST enrollment:Issuance CA Authorization
Configure which CAs are authorized to issue certificates through a DMS:Webhook Authorization
For advanced authorization logic, configure webhook-based validation:JWT Claims and Authorization
When using JWT authentication, authorization decisions can be based on token claims:Standard Claims
Role-Based Access
Implement RBAC by mapping JWT roles to allowed operations:| Role | Permissions |
|---|---|
viewer | Read-only access to all resources |
operator | Read/write devices, read CAs |
ca-operator | Full CA management, certificate issuance |
admin | Full platform access, DMS management |
Audit and Compliance
Authorization Events
Lamassu logs authorization decisions for audit purposes: Successful authorization:Compliance Considerations
Principle of Least Privilege
Grant minimum permissions necessary for each identity. Regularly review and revoke unnecessary access.
Separation of Duties
Separate CA creation, certificate issuance, and device provisioning roles.
Audit Trail
Enable comprehensive logging of authorization decisions for compliance and forensic analysis.
Regular Access Reviews
Periodically review authorization configurations, especially DMS validation CA lists.
Authorization Best Practices
1. Implement Defense in Depth
Combine multiple authorization layers:- Network-level controls (firewall, VPC)
- Transport-level security (mTLS)
- Application-level authorization (JWT, RBAC)
- Resource-level validation (DMS CA lists)
2. Restrict DMS Creation
Tightly control who can create and configure DMS instances:3. Limit CA Operations
Restrict CA creation and signing operations:- Require multi-factor authentication for CA creation
- Implement approval workflows for new CAs
- Separate signing keys from management operations
- Use HSMs for production CA private keys
4. Monitor Authorization Failures
Alert on repeated authorization failures:Troubleshooting Authorization Issues
Problem: Device enrollment rejected
Symptoms:- HTTP 401 or 403 during EST enrollment
- “Client certificate not trusted” errors
-
Verify client certificate chain:
-
Check DMS validation CA list:
-
Confirm certificate issuer matches validation CA:
Problem: API requests return 403 Forbidden
Symptoms:- Authenticated but cannot access resource
- Missing permissions in JWT
-
Decode and inspect JWT claims:
- Verify required roles/permissions are present
-
Check token expiration:
- Review service authorization configuration
Problem: Webhook authorization timing out
Symptoms:- Enrollment requests take >5 seconds
- Webhook timeout errors in logs
-
Test webhook endpoint directly:
-
Increase timeout if necessary:
- Implement webhook caching if applicable
Related Topics
- Authentication - Identity verification methods
- Security Best Practices - Security hardening guide
- Device Management - Device lifecycle operations
