Card Management System¶
[Team | Wilson Team] [Tech Lead | av603] [Service Owner | TBC] [Service Manager | TBC] [Product Manager | TBC]
This page gives an overview of the Card Management System, describing its current status, where and how it's developed and deployed, and who is responsible for maintaining it.
Warning
This service as a whole is currently in active development and at beta stability.
Service Description¶
The Card Management System is a replacement for the existing legacy card database. The Card Management System will allow the management of university cards - from the creation and printing of university cards, through to the export of data for use by downstream systems.
Service Status¶
The Card Management System as a whole is currently in beta
, with many of the components of the
service under active development. Details of the project can be found within the
project page on the UIS site.
Contact¶
Technical queries and support should be directed to universitycard-dev@uis.cam.ac.uk and will be picked up by a member of the team working on the service. To ensure that you receive a response, always direct requests to universitycard-dev@uis.cam.ac.uk rather than reaching out to team members directly.
Queries about the project or functionality of the Card Management System should be raised as GitLab issues in the feedback repository.
Technical questions or problems with the Card API should be raised as GitLab issues in the Card API repository.
Queries about data or operational issues such as card replacements should be directed to the card office at universitycard@admin.cam.ac.uk.
Architecture¶
The Card Management system is made up of the following components:
- The Card Frontend
- a React-based frontend application used by card representatives and card office staff to view card details, print cards, and in future order new cards and revoke existing cards.
- The Printer Client
- a Python and Java CLI application which interfaces with the Card API to allow cards to be printed by the card office, making use of a wrapper around the SDK for the Zebra Series 7 printers currently in use for card printing.
- The Card Client - a Python CLI to allow export of card details for institutions across the University, mainly used to populate access systems which require a CSV feed of active card details.
- The Card API - a Django application which acts as our single source of truth for card details, allowing querying of card data, printing of cards, raising card requests and revoking cards.
- The Photo API
- a Django application which acts as our single source of truth for 'approved' photos of members of the University, used to fetch photos which appear on University cards.
- Card Sync Tool - a Python CLI tool which is used to sync card and photo data from the legacy card database to the Card and Photo APIs.
All components are deployed to GCP within the
Identity Platform Deployment
project. The Card Sync Tool
is run on a
GitLab Scheduled pipeline
defined under the
legacy_data_sync
directory.
Deployment¶
Environment Name | Component | URL |
---|---|---|
Production | Card Frontend | https://card.apps.cam.ac.uk |
Production | Card API | https://api.apps.cam.ac.uk/card/ |
Production | Photo API | https://api.apps.cam.ac.uk/photo/ |
Staging | Card Frontend | https://card-frontend.test.identity.gcp.uis.cam.ac.uk/ |
Staging | Card API | https://api.apps.cam.ac.uk/card-test/ |
Staging | Photo API | https://api.apps.cam.ac.uk/photo-test/ |
Development | Card Frontend | https://card-frontend.devel.identity.gcp.uis.cam.ac.uk/ |
Development | Card API | https://api.apps.cam.ac.uk/card-dev/ |
Development | Photo API | https://api.apps.cam.ac.uk/photo-dev/ |
API documentation for the production version of the Card API and Photo API can be found on the API Gateway's developer portal:
Currently the Production
instances of the Photo and Card API sync data from the CARD
legacy card database. The Staging
instances of the Photo and Card API
sync data from the development CARD_T
Oracle database, and the Development
instances sync
a limited set of data from the CARD_T
Oracle database. The frequency of data sync is defined
by the sync configuration held within the
deployment project.
Technologies used¶
The following gives an overview of the technologies the Card Management System is built on.
Category | Language | Primary framework |
---|---|---|
Card Frontend | TypeScript | React |
Printer Client | Python / Java | pyscard / Zebra Printer SDK |
Card Client | Python | Requests |
Card API | Python | Django |
Photo API | Python | Django |
Sync Tool | Python | Oracle_cx |
Operational documentation¶
The following gives an overview of how the Card Management System is deployed and maintained.
How and where the Card Management System is deployed¶
The infrastructure for the Card Management System is deployed through the Terraform defined within the Deploy Identity project. The Card API, Photo API and Card Frontend are deployed via GitLab pipelines, and will be automatically deployed to staging on the success of each master pipeline (see pipeline configuration here), with production deployment a manual step in the pipeline once staging has succeeded.
Deploying a new release¶
Deploying any infrastructure changes can be completed using Logan as described within the Deploy Identity project's readme.
Deploying a new release of the Card API, Photo API or card frontend to staging and then production can be completed by running the master pipeline within the project's repo. Changes must be tested in staging before deploying to production.
Monitoring¶
The Card API, Photo API and Card Frontend make use of our GCP site monitoring module for monitoring of the production environment. This will send an alert to devops-alarms@uis.cam.ac.uk if any of the deployments have non-transient uptime check failures.
Authentication and Authorization¶
The card management system enforces authentication and authorization using a number of different methods.
Service-to-service Card and Photo API authorization¶
The Card and
Photo allow users of the API Gateway
to request access to the API backends. Granting access to an application within the API Gateway
will allow an application to query the APIs, but will only allow them to see entities that they
own - i.e. photos or cards which are attached to the identifier given to that application within
the API Gateway. This will likely mean that they will not be able to see any cards or photos. See
Card and Photo API permission model
below to determine how to grant wider access to applications.
Important
The API Gateway is only used for authentication for the Card and Photo APIs and therefore allowing an application to access either API does not imply that this application can access or make changes to any card records.
End-user authentication in the Card Frontend¶
The Card Frontend authenticates uses against the API Gateway using the Auth Code with PKCE flow. This allows the API Gateway to identify the individual who is using the Card Frontend and pass this information to the Card and Photo APIs. This also allows the Card Frontend to use the identity token provided by the API Gateway to display basic information about the user. The code which handles the authentication flow can be found here.
Card and Photo API permissions model¶
The Card and Photo API's permissions models rely on a specification which documents the applications, people or groups of people who are granted certain levels of access. Both permissions specifications can be found in the deploy identity project:
The most commonly granted permission are CARD_DATA_READER
for the Card API and PHOTO_VIEWER
for the Photo API, which allow a person or application to view all cards and all photos. These
permissions should only be granted to applications registered by institutional staff, computer
officers or other IT staff.
The permissions specifications are updated using terraform in the same way as any other part of the infrastructure, as documented in the deployment project
Card Frontend permissions model¶
The Card Frontend honours the permissions model enforced by the Card and Photo APIs by only
displaying relevant actions to users with a given permission
(e.g. hiding the 'queue for printing' button if the user is not able to create cards.
Additionally, the Card Frontend currently requires that all users have the
CARD_DATA_READER
permission,
without this permission a user is shown an error screen informing them that do not have access.
Additional documentation¶
Information about the overall architecture of the new Card Management System can be found within the wiki page for the identity project.
Service Management¶
The Team responsible for this service is Wilson Team.
The Tech Lead for this service is av603.
The Service Owner for this service is TBC.
The Service Manager for this service is TBC.
The Product Manager for this service is TBC.
The following engineers have operational experience with this service and are able to respond to support requests or incidents: