Role-based authentication framework for enterprise Vishal Kher Yongdae Kim Friday, November 19, 2004.

Slides:



Advertisements
Similar presentations
Chapter 20 Oracle Secure Backup.
Advertisements

Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Decentralized User Authentication in a Global File System Max Meisterhans - Seminar in Distributed Computing WS 05/06.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Access Control Methodologies
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Active Directory: Final Solution to Enterprise System Integration
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Security Vishal Kher 10 February Objectives Authentication and Access ControlAuthentication and Access Control –Using Role Based Access Control.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Chapter 10: Authentication Guide to Computer Network Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 7: WORKING WITH GROUPS
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Module 7 Active Directory and Account Management.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
G53SEC 1 Access Control principals, objects and their operations.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Kerberos Guilin Wang School of Computer Science 03 Dec
CS 346 – Chapter 11 File system –Files –Access –Directories –Mounting –Sharing –Protection.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Introduction to AFS IMSA Intersession 2003 An Overview of AFS Brian Sebby, IMSA ’96 Copyright 2003 by Brian Sebby, Copies of these slides.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
11 IMPLEMENTING ACTIVE DIRECTORY Chapter 2. Chapter 2: IMPLEMENTING ACTIVE DIRECTORY2 REQUIREMENTS FOR ACTIVE DIRECTORY  Microsoft Windows Server 2003.
Chapter 14: System Protection
Introduction to Operating Systems
Cryptography and Network Security
Authentication Applications
Active Directory Administration
Update on EDG Security (VOMS)
Database management systems
Presentation transcript:

Role-based authentication framework for enterprise Vishal Kher Yongdae Kim Friday, November 19, 2004

2 Outline  Motivation  Role-based authentication framework – Requirements – Assumptions – Schemes  Related work  Implementation Plans

3 A Simple Enterprise  How to provide authentication and access control across multiple servers?  Admins. need to maintain this info. for individual servers – Too cumbersome and difficult – Prone to errors – Unnecessary repetition of work Network File server Database server

4 Managing multiple systems is hard  In an organization, users require access to multiple systems – File servers, Data base servers, travel/retirement accounts  These systems require some form authentication and authorization  This information can get updated independently – Hard to maintain consistency across multiple systems System independent authentication and authorization operations

5 Who should access the data?  In an enterprise, end users do not ``own'' data – Access decisions based on user’s job function or “role” – Role-based access control (RBAC) uses this fact  Role is a set of transactions – Transaction (operation) is unit of control –r/w, search, deposit, withdraw, accept proposals  Permissions are assigned to “Roles” –Member enjoys the privileges assigned to the role  Role Membership can change frequently – Typically roles do not change frequently  Roles and permissions can be inherited or constrained

6 RBAC Continued  Requires thorough analysis and policy decisions – Depends on an organization – Once framework is set-up administrative task is to assign user’s to roles  Advantages –Ease of management and reduce cost of administration –Less errors –Can describe complex access control policies  Implementation –Sun Solaris 8.0, Oracle 9iAS –Web server for UNIX and NT - NIST  Recently, NIST proposed RBAC standard

7 Whats in it for me?  How can a user acquire his roles?  How can a user prove his roles?  How can a system administrator revoke a user and/or user’s roles?

8 Current Storage Servers  Heavily based on UNIX-style UID and GID – Access decisions are primarily based on UID/GIDs – File ACL: user/group/other  Perils of UID/GID style access control – How to maintain a global UID/ GID mapping? – How to find all files associated with a particular UID? – Difficult to maintain and administer this information  Backups – Data is long-lived – What if the UID/GID doesn’t exist while restoring old backed-up data root has to recover the data But the data doesn’t really belong to root

9 The Final Theme  Efficiently use RBAC authentication framework – Can be combination of capability and identity credentials  Free servers from the bondage of UID/GID style access control  File access based on roles – Change file access semantics from UID/GID to roles only

10 Related Work  Kerberos and other 3-party protocols – No notion of roles/groups – Cannot specify constraints on the roles – Sometimes RBAC needs support for authorization Mixture of access permissions as well as list of roles  Most of the other schemes use public keys – Use extension field of X.509 v3 (list roles) – X.509 attribute certificate (ACL in certificate) – Not appropriate for high performance applications File servers, HPC High client-side latency and high load on the file servers – Use symmetric key techniques

11 Outline  Motivation  Related work  Role-based authentication framework – Requirements – Assumptions – Scheme  Implementation Plans

12 Applying Role-based Policies  Central Policy Manager (Aura) determines policies – User – role assignment – Role – permission assignment – Revocation and other management activities  Other servers implement these policies – Data access based on roles Network Servers Aura

13 Requirements  Role membership and policies should be maintained by a central entity – Entity should be different from local admins.  Clients should get appropriate roles and should be able to prove his/her roles  Client – Server Mutual authentication – Authentication based on symmetric keys  Efficient revocation mechanism  File access should be based on roles

14 System Assumptions  Aura is a trusted entity  Clients are not trusted – Can perform all kinds of active/ passive attacks  Server – client communication link is insecure – No underlying security protocol such as IPSec  Aura can communicate securely with clients  Servers are trusted to play their role appropriately

15 System Setting Aura File server rNurse rwDoctor RightsRole Doctor Surgeon […] Alice RoleUser K K Get role key Role Key = H K (roleList) M, MAC roleKey (M) R, MAC roleKey (R)

16 Protocol Details (1)  Setup – Aura and server share K  Generation of role key – role Key c =MAC K (I c,H(roleList),expiry,[..]) I c = Identity of client C roleList = list of all roles of the client expiry = validity period of the role key [..] = constraints and other stuff  Securely transfer roleKey c to the client –A  C: roleKey c, roleList, expiry

17 Protocol Details (2)  Freshness – – C  S: M, MAC roleKey c (M) M=Req,I c,roleList,expiry,currentRole,r – S  C: M={Resp, r, s}, MAC roleKey c (M)

18 Protocol Details (3)  C  S: M, MAC roleKey c (M) –M = {Opr, Oid, I c, roleList, expiry, currentRole, r, s}  Server – Checks if currentRole is present in roleList – Generates roleKey c from K,I c,roleList,expiry – Verifies MAC roleKey c (M) and freshness – grants access rights according to the RBACL stored  S  C: M, MAC roleKey c (M) –M = {Response, r, s}

19 Revocation  Revocation of client – Expiry field in roleKey – Revocation list File manager can push it to devices Devices can pull periodically using LDAP  Client’s role – This information can be include in revocation list – Include an expiry field with roles in the role Key

20 Revocation (Contd.)  Revocation of entire role – This information can be include in revocation list  Changes to RBACL – Store an object per role on the device Doubly linked pointer to all objects accessed by the role – Advantage Faster lookup – Disadvantage Space Frequent updates of this object

21 Advangates  Centralized revocation and management  Simple role-based authentication  Direct access to servers after acquiring initial roleKeys – No public key operations on data path  Free from the UID problem

22 Implementation Plans (1) NFS with ext3 LDAP Instant revocation Periodic download Open {UID = random, GID = H(rolename)} NFS ?? 1.Password 2.Public key

23 Implementation Plans (2)  Main challenge – Getting rid of UID/GID  Format for roleKeys  How to map role to some id? – Hash of role name? – Unique global and permanent id  Change NFS RPCs to modify access semantics  Role-based access control list – Linux ext3 extended attributes

24 Thank You Suggestions?