Authority Management Systems Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
GT 4 Security Goals & Plans Sam Meder
ROLE BASED ACCESS CONTROL
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Attribute-Based Access Control Models and Beyond
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Authz work in GGF David Chadwick
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
The EC PERMIS Project David Chadwick
“A Service-enabled Access Control Model for Distributed Data” Mark Turner, Philip Woodall Pennine Forum - 16 th September 2004.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Fall 2010/Lecture 301 CS 426 (Fall 2010) Role Based Access Control.
A summary of ebXML (the new World Standard for e-Business) Dave Welsh Collaborative Domain Corporation.
Data management. Purpose Have a peer conversation about data architectures Interactive Share your experience 7 problem spaces.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Progress SOA Reference Model Explained Mike Ormerod Applied Architect 9/8/2008.
December 2001 Internet2 Virtual Briefing - 1 -Stanford University Authority Registry December 12, 2001 Stanford University Lynn McRae.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
The Roles Database at MIT Scott Thorne Jim Repa December 12, 2001 See also:
MIT’s Roles Database: Our Model for Authorizations Jim Repa Common Solutions Group January 11, 2002 See also:
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Supporting education and research Security and Authentication for the Grid Alan Robiette, JISC Development Group.
19 May 2003, TERENA, Zagreb Civilizing eduPerson Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group Keith Hazelton,
Internet2 Member Meeting, Arlington VA, April 2004 I2MI Authorization Agenda, RL "Bob" Morgan, University of Washington.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
The Laboratory of Information Integration, Security and Privacy ● University of North Carolina at Charlotte URL: 306, UNC Charlotte.
A Flexible Access Control Service for Java Mobile Code HPCC lab 문 정 아.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
05 October 2001 Directories: The Next Stage Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect University.
Dimensionality of Evaluation Contexts for Ontologies Hans Polzer Chair Emeritus, Net Centric Attributes Functional Team 24 January 2013.
Authorization: Just when you thought middleware was no fun anymore Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Member, Internet2 Middleware.
Advanced CAMP Emerging from the mists: Requirements for supporting VOs voReqs ppt Keith Hazelton
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Directory based Middleware Services Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2.
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
Security and Delegation The Certificate Perspective Jens Jensen Rutherford Appleton Laboratory Workshop at NIKHEF, 27 April 2010.
© 2008 Open Grid Forum PGI - Information Security in the UNICORE Grid Middleware Morris Riedel (FZJ – Jülich Supercomputing Centre & DEISA) PGI Co-Chair.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
Eclipse Foundation, Inc. Eclipse Open Healthcare Framework v1.0 Interoperability Terminology HL7 v2 / v3 DICOM Archetypes Health Records Capture Storage.
Institute for Cyber Security
The DAMe’s First Steps: eduroam and NAS-SAML
Privilege Management: the Big Picture
OM-AM and RBAC Ravi Sandhu*
Signet & Privilege Management
Groups and Permissions
Engineering Authority and Trust in Cyberspace: George Mason University
Attribute-Based Access Control (ABAC)
Introduction to SOA Part II: SOA in the enterprise
NSF Middleware Initiative: GridShib
Presentation transcript:

Authority Management Systems Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2 Internet2 Fall Member Meeting, Los Angeles, 29-Oct-02 Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2 Internet2 Fall Member Meeting, Los Angeles, 29-Oct-02

29-Oct-02 2 Authority Mgmt System Topics Audience: Authority Management System champions in the making – and their victims Glimpses of some real-world Authority Management Systems Dimensions of difference & similarity Interoperation of Authority Management systems

29-Oct-02 3 Focus on first of two fundamental aspects of Authorization: “Build-time:” Edit, compile, transform and propagate authority information relating to authorization & policy vs. “Run-time:” Access control decisions by resource (manager) at time of actual request based on system-specific data/processes

29-Oct-02 4 MACE vs. The Authority Management Problem

29-Oct-02 5 Models: MIT Roles DB AuthZ Triples Authorization [Authority] = Person + Function + Qualifier (for OKI, a “person” will be generalized to an “agent”) Lets someone do something somewhere: Who? =Person What? =Function Where? =Qualifier

29-Oct-02 6 Models: MIT Roles DB AuthZ Why Qualifiers? Often a person is authorized to perform a function only within an org. area (school, dept., lab, etc.) or within a financial area PERSONFUNCTIONQUALIFIER JoeReview SalariesDept. of Biology SallyCreate RequisitionsAcct FredApprove Reqs.Accts. in Biology AnnGrade StudentsCourse 6.001

29-Oct-02 7 Stanford Authority Registry An Authority Registry -- a managed repository of authority assignments -- not a run-time Access Control System. Authority is defined first in business terms, without reference to any specific system or application. The Authority Registry separates user visible portions of authority management, expressed in business terms, from internal system components expressed in technical terms. Applications must read and translate authority information into local terms.

29-Oct-02 8 Stanford Authority Registry

29-Oct-02 9 Stanford Authority Registry Functions The basic unit of Business work. A person’s job will consist of one or more Functions. Authority assignments are at the Function level. Functions consist of one or more Tasks. Tasks A discrete unit of work, typically a piece of what is needed to accomplish a function. Represents a set of privileges that must be be set together. Are reusable

29-Oct Stanford Authority Registry Entitlements Atomic unit of authority control. An abstraction of system specific privileges, but not in any system’s specific language. What applications read to set their internal security.

29-Oct Ponder from Imperial College, London Entering the Space Age Example domain expression: /A/B/D

29-Oct Ponder

29-Oct Ponder

29-Oct Ponder

29-Oct Ponder download and further information The Ponder toolkit can be downloaded under a GNU Lesser GPL from Imperial College in London: Documentation plus several technical papers on Ponder are available at that site as well

29-Oct National Institute of Standards & Technology RBAC Model Role-based Access Control (RBAC) formal model with provable properties

29-Oct Example: Bank Role/Role Associations In NIST RBAC Model

29-Oct NIST RBAC Model Reference implementation including management tools for role engineering NIST seeking to promote this as a standard: A Proposed Standard for Role-Based Access Control David F. Ferraiolo National Institute of Standards and Technology Ravi Sandhu George Mason University Serban Gavrila VDG Incorporated D. Richard Kuhn and Ramaswamy Chandramouli National Institute of Standards and Technology December 18, 2000

29-Oct UWisc Project Planning: Cascading phrases re controlled access to resources Systems of record Identify Persons Affiliations / Attributes Entitlements Services Service Providers Who have That are mapped to That determine eligibility for That are offered by

29-Oct UWisc: Separates policy from technical architecture and implementation Ask the technologists To build a system that can easily accommodate new sources, people, services & mappings. Ask the stakeholders (sponsors, service providers,…) To agree on policies & procedures in terms of this cascading diagram Yields a cleaner separation of the two activities User visible vis-à-vis system internal a la Stanford Gives the two groups a shared language

29-Oct A key point of difference between these systems: They all group objects to create scalable, manageable systems But each model aggregates at different points: MODELPOINT(S) OF AGGREGATIONExample MIT Roles DBQualifierDept. of Biology Stanford AuthorityTask, Function {, Role}Office Admin PonderSubject & Target “Domains”/faculty/physics NISTRole HierarchiesSurgeon Doctor

29-Oct Interop challenge: Gateway(?) for mobile authority information / assertions / policy SAML, XACML (Security Assertions Markup Language, eXtensible Access Control Markup Language (OASIS standards body) Permis Attribute Certificates Grid Proxy Certificates SPKI, SDSI Certificates MS Kerberos PAC (Authorization data) in Session ticket (see next slide) AGE

29-Oct Target Auth data:  User SID  Group SIDs  Privileges Kerberos LSA Session ticket Server application Building An Access Token From A Kerberos Ticket Kerberos package gets auth data from session ticket Impersonation token Token Local Sec Authority builds access token for security context Server thread impersonates client context

29-Oct Do AuthInfo systems themselves ever need to interoperate? Well, we do want low-impedance resource access across administrative boundaries But do we need to manage Authority Information across those boundaries? REALLY hard, especially if the underlying models aren’t commensurable Minimalist approach: Net out AuthorityInfo to entitlements and move entitlements between domains

29-Oct Conclusion; “Back to you, RL.” We’re still throwing a little salt, circling in the arena… But the payoff for middleware services investment really seems to lie in the authorization (authority management + access control management) space