Download presentation
Presentation is loading. Please wait.
Published byDiane Stanley Modified over 9 years ago
1
© 2007 Open Grid Forum CAOPS-WG RP Namespace Constraints Policy David Groep CAOPS-WG OGF20 May 8 th, 2007
2
© 2007 Open Grid Forum 2 The Issue Subject names (in particular their string representation) are used in all authorization decisions The global X.500 namespace has not materialized federations have a need to coordinate the namespace (and only sub-parts of the namespace may be part of the federation) RPs need a way to enforce this coordination
3
© 2007 Open Grid Forum 3 Formats The Globus Toolkit v1.0 – 4.0 ‘pre-WS’ parts support a way of namespace constaining (‘signing policy’) but this capability was lost in the java parts and never was part of other middlewares Even in GT pre-WS, the signing policy file format is limited and has serious implementation limitations
4
© 2007 Open Grid Forum 4 Current document Abstract 1.Introduction 2.Namespace constraints policy 3.Requirements on the namespace constraints policy expression and interpretation 4.A possible implementation of a namespace constraints policy collection (file) 4.1Expression language 4.2Interpretation of the policy collection (file) 4.3Naming and location of the policy collection (file) 5.Security Considerations
5
© 2007 Open Grid Forum 5 Requirements section (current) it must be possible to have trusted issuers with and without namespace constraints policies co-exist within the same trusted repository. it must be possible to distribute a namespace constraints policy in conjunction with each individual issuer trust anchor. it must be possible to support the concept of “subordinate” issuers in a hierarchical chain of issuers, such that a single namespace constraints policy collection (file) support the expression of namespace constraints on any subordinate issuer. the string rendering identifier naming of directoryNames and X.500 distinguished names in the policy expression must comply with RFC2253 the format must be human readable, in order for relying parties to visibly inspect and assess the namespace constraint policy the policy expression must support Unix-shell glob style wildcard pattern matching. Wildcard matching must be possible anywhere in the pattern. it must be possible to explicitly set a namespace constraints policy for a subordinate issuer, without modifying the policy collection (file) for the up- stream issuer(s). Such a policy on a subordinate issuer must override any policy defined in up-stream policy collections (files). a subordinate authority trust anchor must be able to change (i.e. a subordinate could be compromised and re-keyed) without having to change the namespace constraints policy in any end-system configuration.
6
© 2007 Open Grid Forum 6 Alternative formats As an experiment, the IGTF distributes the same information also in a ‘.namespaces’ file (see eugridpma web site) meets some of the requirements listed previously not yet implemented anywhere TO Issuer "CN=SwissSign CA (RSA IK May 6 1999 18:00:58),O=SwissSign,C=CH" \ PERMIT \ Subject "C=CH,O=SwissSign,CN=SwissSign Bronze CA" TO Issuer "C=CH,O=SwissSign,CN=SwissSign Bronze CA" \ PERMIT \ Subject "C=CH,O=SwissSign,CN=SwissSign Silver CA" TO Issuer "C=CH,O=SwissSign,CN=SwissSign Silver CA" \ PERMIT \ Subject "C=CH,O=Switch - Teleinformatikdienste,CN=SWITCH CA" TO Issuer "C=CH,O=Switch - Teleinformatikdienste,CN=SWITCH CA" \ DENY \ Subject "*,O=CERN,C=CH" TO Issuer "C=CH,O=Switch - Teleinformatikdienste,CN=SWITCH CA" \ DENY \ Subject "*,O=SwissSign,C=CH" TO Issuer "C=CH,O=Switch - Teleinformatikdienste,CN=SWITCH CA" \ PERMIT \ Subject "*,O=*,C=CH"
7
© 2007 Open Grid Forum 7 Forward? Refocus document on requirements Then, get any format implemented widely document that format through a second document
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.