Download presentation
Presentation is loading. Please wait.
Published byEgbert Eaton Modified over 9 years ago
1
USCGrid A (Very Quick) Introduction To Authn/Authz http://www.usc.edu/isd/services/uscgrid
2
April 2003USCGrid at Internet22 USCGrid: A (Very Quick) Intro to Authn/Authz Security – The Bird’s-eye View Authn Authz References
3
April 2003USCGrid at Internet23 USCGrid: A (Very Quick) Intro to Authn/Authz Security – The Bird’s-eye View Authn Authz References
4
April 2003USCGrid at Internet24 Security – The Bird’s-eye View Everybody wants a secure network. Q: USCGrid: A (Very Quick) Intro to Authn/Authz
5
April 2003USCGrid at Internet25 Security – The Bird’s-eye View Everybody wants a secure network. Nobody wants servers broken into. Q: USCGrid: A (Very Quick) Intro to Authn/Authz
6
April 2003USCGrid at Internet26 Security – The Bird’s-eye View Everybody wants a secure network. Nobody wants servers broken into. How do the NMI components address security? Q: USCGrid: A (Very Quick) Intro to Authn/Authz
7
April 2003USCGrid at Internet27 Security – The Bird’s-eye View There are several aspects to security. A: USCGrid: A (Very Quick) Intro to Authn/Authz
8
April 2003USCGrid at Internet28 Security – The Bird’s-eye View There are several aspects to security. Authentication A: USCGrid: A (Very Quick) Intro to Authn/Authz
9
April 2003USCGrid at Internet29 Security – The Bird’s-eye View There are several aspects to security. Authentication – which concerns itself with verifying identity. A: USCGrid: A (Very Quick) Intro to Authn/Authz
10
April 2003USCGrid at Internet210 Security – The Bird’s-eye View There are several aspects to security. Authentication – which concerns itself with verifying identity. Authorization A: USCGrid: A (Very Quick) Intro to Authn/Authz
11
April 2003USCGrid at Internet211 Security – The Bird’s-eye View There are several aspects to security. Authentication – which concerns itself with verifying identity. Authorization – which determines what an authenticated user (or program) is allowed to do. A: USCGrid: A (Very Quick) Intro to Authn/Authz
12
April 2003USCGrid at Internet212 Security – The Bird’s-eye View There are several aspects to security. Confidentiality A: USCGrid: A (Very Quick) Intro to Authn/Authz
13
April 2003USCGrid at Internet213 Security – The Bird’s-eye View There are several aspects to security. Confidentiality – which ensures that no one except the intended parties can gain access to information. A: USCGrid: A (Very Quick) Intro to Authn/Authz
14
April 2003USCGrid at Internet214 Security – The Bird’s-eye View There are several aspects to security. Confidentiality – which ensures that no one except the intended parties can gain access to information. Data integrity A: USCGrid: A (Very Quick) Intro to Authn/Authz
15
April 2003USCGrid at Internet215 Security – The Bird’s-eye View There are several aspects to security. Confidentiality – which ensures that no one except the intended parties can gain access to information. Data integrity – which guards against tampering. A: USCGrid: A (Very Quick) Intro to Authn/Authz
16
April 2003USCGrid at Internet216 Security – The Bird’s-eye View There are several aspects to security. Auditing A: USCGrid: A (Very Quick) Intro to Authn/Authz
17
April 2003USCGrid at Internet217 Security – The Bird’s-eye View There are several aspects to security. Auditing – which logs information as things happen. A: USCGrid: A (Very Quick) Intro to Authn/Authz
18
April 2003USCGrid at Internet218 Security – The Bird’s-eye View There are several aspects to security. Auditing – which logs information as things happen. Intrusion detection A: USCGrid: A (Very Quick) Intro to Authn/Authz
19
April 2003USCGrid at Internet219 Security – The Bird’s-eye View There are several aspects to security. Auditing – which logs information as things happen. Intrusion detection – which notices break-ins. A: USCGrid: A (Very Quick) Intro to Authn/Authz
20
April 2003USCGrid at Internet220 Security – The Bird’s-eye View There are several aspects to security. We’re only going to look at Authentication – authn in security lingo – and Authorization – authz in security lingo. A: USCGrid: A (Very Quick) Intro to Authn/Authz
21
April 2003USCGrid at Internet221 USCGrid: A (Very Quick) Intro to Authn/Authz Security – The Bird’s-eye View Authn Authz References
22
April 2003USCGrid at Internet222 Authn Authn concerns itself with verifying identity. It’s the soldier’s challenge – and his comrade’s response. Q: USCGrid: A (Very Quick) Intro to Authn/Authz
23
April 2003USCGrid at Internet223 Authn Authn concerns itself with verifying identity. It’s the soldier’s challenge – and his comrade’s response. How does NMI handle authn? Q: USCGrid: A (Very Quick) Intro to Authn/Authz
24
April 2003USCGrid at Internet224 Authn There are a couple of different mechanisms used by NMI for authn. A: USCGrid: A (Very Quick) Intro to Authn/Authz
25
April 2003USCGrid at Internet225 Authn There are a couple of different mechanisms used by NMI for authn. Public Key Infrastructure (PKI) technology is used by the Globus Toolkit. A: USCGrid: A (Very Quick) Intro to Authn/Authz
26
April 2003USCGrid at Internet226 Authn There are a couple of different mechanisms used by NMI for authn. Public Key Infrastructure (PKI) technology is used by the Globus Toolkit. However, this segment will instead look at PubCookie, a component that uses passwords. A: USCGrid: A (Very Quick) Intro to Authn/Authz
27
April 2003USCGrid at Internet227 USCGrid: A (Very Quick) Intro to Authn/Authz Security – The Bird’s-eye View Authn Authz References
28
April 2003USCGrid at Internet228 Authz Authz determines what an authenticated user (or program) is allowed to do. Q: USCGrid: A (Very Quick) Intro to Authn/Authz
29
April 2003USCGrid at Internet229 Authz Authz determines what an authenticated user (or program) is allowed to do. How does NMI handle authz? Q: USCGrid: A (Very Quick) Intro to Authn/Authz
30
April 2003USCGrid at Internet230 Authz There are a couple of different mechanisms used by NMI for authz. A: USCGrid: A (Very Quick) Intro to Authn/Authz
31
April 2003USCGrid at Internet231 Authz There are a couple of different mechanisms used by NMI for authz. However, this segment will look at Shibboleth, a component that can grant authorization without knowing the identity of the person requesting authorization. A: USCGrid: A (Very Quick) Intro to Authn/Authz
32
April 2003USCGrid at Internet232 USCGrid: A (Very Quick) Intro to Authn/Authz Security – The Bird’s-eye View Authn Authz References
33
April 2003USCGrid at Internet233 USCGrid: A (Very Quick) Intro to Authn/Authz References Kerberos: A Network Authentication System. Brian Tung. Addison-Wesley. 1999. SSH: The Secure Shell: The Definitive Guide. Daniel J. Barret & Richard E. Silverman. O’Reilly & Associates. 2001.
34
April 2003USCGrid at Internet234 USCGrid: A (Very Quick) Intro to Authn/Authz References Practical Unix & Internet Security. Simson Garfinkel & Gene Spafford. O’Reilly & Associates. 1996. Shibboleth Project. http://shibboleth.internet2.edu http://shibboleth.internet2.edu PubCookie. http://www.washington.edu/pubcookie http://www.washington.edu/pubcookie
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.