Zanzibar implements:
- Configuration consistency: namespace configuration data is read at a single "logical time" for the entirety of each request.
5/ - Causal consistency and "logical timestamp" reads for tuples through Spanner's TrueTime mechanism (cloud.google.com/spanner/docs/t…)
6/ 4️⃣ Low latency
🌏 Zanzibar runs on multiple geographical regions, maximizing co-location with its clients. This both reduces latency as network RTT is minimized, and also increases the systems availability as issues in a single region do not affect the system's availability.
7/ It also:
- Has an internal indexing system to deal with queries that involve deeply nested group structures
- Uses "hedge requests" to minimize tail latency, i.e. sending requests to multiple servers and responding once the fastest one replies (www2.cs.duke.edu/courses/cps296…)
8/ By storing namespaces configuration as part of the server, Zanzibar avoids the need for potentially slower distribution of logic and data to client side policy execution.
9/ 5️⃣ High availability
👩🚒 A consequence of its multi-region setup and write consistency model is that Zanzibar can tolerate more than one region failing and continue to work.
10/ 💪 Redundancy at the compute and storage level (through Spanner) exists in each region's Zanzibar cluster, to tolerate issues with single instances.
---
In the upcoming weeks we'll be sharing more about our decisions implementing a Zanzibar inspired system as a SaaS.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
3/ 0️⃣ Introduction
Zanzibar is a "Relationship based access control" (ReBAC) authorization system, i.e.: a user has access to an object if it has a particular relation to it.
Zanzibar stores (object, relation, user) "tuples" with data about these relations.
3/ You'd: 1. Sign up for a subscription 2. Configure who has access to what 3. Pick an SDK for your favorite language/tool 4. (optionally) Feed your authZ data from existing sources into #sandcastle
That's the ideal future. At this point you'd have AuthZ for your app 🤯
We'll go over what is currently being addressed and what the gaps are👇
2/
As we've mentioned before, solving #fgaatscale requires:
1️⃣ Permission modelling flexibility
2️⃣ Auditing capabilities
3️⃣ Correctness: no invalid permissions are granted
4️⃣ Low Latency
5️⃣ High availability
3/ Solving #fgaatscale is becoming a need because:
☝️ Users expect collaboration features in most products they used, and that requires FGA
✌️ Increasing privacy and compliance regulations require companies in different verticals to restrict access as much as possible
3/ Like github, @googledrive has B2C and B2B models. However, @googledrive's sharing model is the same for B2C and B2B. The difference is who you can share files with.
In this thread explore we'll the problems of authorization at scale using a real world, well known example
2/ This is a key part of product development, especially when building infrastructure. We want to understand what our customers will eventually build with our service.
We also promised to unveil this week the problem we want to dive into 🥁...
2/ The area we'd like to explore is: *fine-grained authorization*
Why this? And why now?👇
3/ Large scale fine-grained authorization as a building block is an unsolved problem. Just like authentication was ~8 years ago. We implement it in every app we build, over and over. There is no generic, cross-platform, cross-domain solution.