IDfusion An Open-Architecture for Kerberos based Authorization
نویسنده
چکیده
Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of distributed information delivery systems. During this evolution no standardized scheme for authorization has emerged. Industry consensus suggests that LDAP is the protocol of choice for storing extended information needed to make authorization decisions. Despite this consensus no standardized scheme has evolved for implementing directory based authorization. This paper discusses a strategy for using the symmetric key management facilities of Kerberos to implement directory based authorization. The system is architected to provide inherent security in the event of a directory compromise. The system offers the management advantages of role based access systems while providing the option for fine grained authorization control. The identity based authorization model uses a service oriented approach to managing authorization. As such it is consistent with and supportive of the trend toward services oriented application architectures.
منابع مشابه
IMPROVING THE SECURITY PERFORMANCE IN COMPUTER GRIDS Architecture and Results
Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture we use a Kerberos-based approach (symmetric cryp...
متن کاملA Kerberos security architecture for web services based instrumentation grids
Instrumentation Grids aim at controlling andmanaging heterogeneous resources & instruments securely, reliably and in near real-time.Within this context, we present aWeb Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or P...
متن کاملA Distributed Kerberized Access Architecture for Real Time Grids
Authentication, authorization and encryption in large scale distributed Grids are usually based on a Public Key Infrastructure (PKI) with asymmetric encryption and X.509 – Proxy certificates for user single sign-on to resources. This approach, however, introduces processing overhead, that may be undesirable in near real time Grid applications (e.g. Grids used for time critical instrument monito...
متن کاملMore Privacy in Context-aware Platforms: User Controlled Access Right Delegation using Kerberos
In this paper we propose a distributed Kerberos architecture in which each mobile client runs her own Kerberos ticket granting server. Each of these individual TGS may provide tickets only for data that is owned by the mobile (user) on behalf of which it is executed. In addition the initial authentication phase can be done by the standard Kerberos approach as well as based on PKI using certific...
متن کاملA Distributed Privacy Enforcement Architecture based on Kerberos
In this paper we propose a distributed privacy enforcement architecture. Each mobile client runs its own privacy negotiation unit as well as its own Kerberos ticket granting server. The privacy negotiation units are compatible with the P3P standard, but allow mutual exchange of privacy policies and enforce that these are digitally signed in case of an agreement. Each of the individual TGS may p...
متن کامل