Download presentation
Presentation is loading. Please wait.
Published byMalcolm Ferguson Modified over 8 years ago
1
Role-based authentication framework for enterprise Vishal Kher Yongdae Kim Friday, November 19, 2004
2
2 Outline Motivation Role-based authentication framework – Requirements – Assumptions – Schemes Related work Implementation Plans
3
3 A Simple Enterprise How to provide authentication and access control across multiple servers? Admins. need to maintain this info. for individual servers – Too cumbersome and difficult – Prone to errors – Unnecessary repetition of work Network File server Database server
4
4 Managing multiple systems is hard In an organization, users require access to multiple systems – File servers, Data base servers, travel/retirement accounts These systems require some form authentication and authorization This information can get updated independently – Hard to maintain consistency across multiple systems System independent authentication and authorization operations
5
5 Who should access the data? In an enterprise, end users do not ``own'' data – Access decisions based on user’s job function or “role” – Role-based access control (RBAC) uses this fact Role is a set of transactions – Transaction (operation) is unit of control –r/w, search, deposit, withdraw, accept proposals Permissions are assigned to “Roles” –Member enjoys the privileges assigned to the role Role Membership can change frequently – Typically roles do not change frequently Roles and permissions can be inherited or constrained
6
6 RBAC Continued Requires thorough analysis and policy decisions – Depends on an organization – Once framework is set-up administrative task is to assign user’s to roles Advantages –Ease of management and reduce cost of administration –Less errors –Can describe complex access control policies Implementation –Sun Solaris 8.0, Oracle 9iAS –Web server for UNIX and NT - NIST Recently, NIST proposed RBAC standard
7
7 Whats in it for me? How can a user acquire his roles? How can a user prove his roles? How can a system administrator revoke a user and/or user’s roles?
8
8 Current Storage Servers Heavily based on UNIX-style UID and GID – Access decisions are primarily based on UID/GIDs – File ACL: user/group/other Perils of UID/GID style access control – How to maintain a global UID/ GID mapping? – How to find all files associated with a particular UID? – Difficult to maintain and administer this information Backups – Data is long-lived – What if the UID/GID doesn’t exist while restoring old backed-up data root has to recover the data But the data doesn’t really belong to root
9
9 The Final Theme Efficiently use RBAC authentication framework – Can be combination of capability and identity credentials Free servers from the bondage of UID/GID style access control File access based on roles – Change file access semantics from UID/GID to roles only
10
10 Related Work Kerberos and other 3-party protocols – No notion of roles/groups – Cannot specify constraints on the roles – Sometimes RBAC needs support for authorization Mixture of access permissions as well as list of roles Most of the other schemes use public keys – Use extension field of X.509 v3 (list roles) – X.509 attribute certificate (ACL in certificate) – Not appropriate for high performance applications File servers, HPC High client-side latency and high load on the file servers – Use symmetric key techniques
11
11 Outline Motivation Related work Role-based authentication framework – Requirements – Assumptions – Scheme Implementation Plans
12
12 Applying Role-based Policies Central Policy Manager (Aura) determines policies – User – role assignment – Role – permission assignment – Revocation and other management activities Other servers implement these policies – Data access based on roles Network Servers Aura
13
13 Requirements Role membership and policies should be maintained by a central entity – Entity should be different from local admins. Clients should get appropriate roles and should be able to prove his/her roles Client – Server Mutual authentication – Authentication based on symmetric keys Efficient revocation mechanism File access should be based on roles
14
14 System Assumptions Aura is a trusted entity Clients are not trusted – Can perform all kinds of active/ passive attacks Server – client communication link is insecure – No underlying security protocol such as IPSec Aura can communicate securely with clients Servers are trusted to play their role appropriately
15
15 System Setting Aura File server rNurse rwDoctor RightsRole Doctor Surgeon […] Alice RoleUser K K Get role key Role Key = H K (roleList) M, MAC roleKey (M) R, MAC roleKey (R)
16
16 Protocol Details (1) Setup – Aura and server share K Generation of role key – role Key c =MAC K (I c,H(roleList),expiry,[..]) I c = Identity of client C roleList = list of all roles of the client expiry = validity period of the role key [..] = constraints and other stuff Securely transfer roleKey c to the client –A C: roleKey c, roleList, expiry
17
17 Protocol Details (2) Freshness – – C S: M, MAC roleKey c (M) M=Req,I c,roleList,expiry,currentRole,r – S C: M={Resp, r, s}, MAC roleKey c (M)
18
18 Protocol Details (3) C S: M, MAC roleKey c (M) –M = {Opr, Oid, I c, roleList, expiry, currentRole, r, s} Server – Checks if currentRole is present in roleList – Generates roleKey c from K,I c,roleList,expiry – Verifies MAC roleKey c (M) and freshness – grants access rights according to the RBACL stored S C: M, MAC roleKey c (M) –M = {Response, r, s}
19
19 Revocation Revocation of client – Expiry field in roleKey – Revocation list File manager can push it to devices Devices can pull periodically using LDAP Client’s role – This information can be include in revocation list – Include an expiry field with roles in the role Key
20
20 Revocation (Contd.) Revocation of entire role – This information can be include in revocation list Changes to RBACL – Store an object per role on the device Doubly linked pointer to all objects accessed by the role – Advantage Faster lookup – Disadvantage Space Frequent updates of this object
21
21 Advangates Centralized revocation and management Simple role-based authentication Direct access to servers after acquiring initial roleKeys – No public key operations on data path Free from the UID problem
22
22 Implementation Plans (1) NFS with ext3 LDAP Instant revocation Periodic download Open {UID = random, GID = H(rolename)} NFS ?? 1.Password 2.Public key
23
23 Implementation Plans (2) Main challenge – Getting rid of UID/GID Format for roleKeys How to map role to some id? – Hash of role name? – Unique global and permanent id Change NFS RPCs to modify access semantics Role-based access control list – Linux ext3 extended attributes
24
24 Thank You Suggestions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.