Certificate-based authorization policy in a pki environment

被引:122
作者
Thompson, Mary R. [1 ,2 ]
Essiari, Abdelilah [1 ,2 ]
Mudumbai, Srilekha [1 ,2 ]
机构
[1] Lawrence Berkeley Natl. Laboratory, MS50B-2239, Berkeley, CA 94720
关键词
Digital certificates; Public key infrastructure; XML;
D O I
10.1145/950191.950196
中图分类号
学科分类号
摘要
The major emphasis of public key infrastructure has been to provide a cryptographically secure means of authenticating identities. However, procedures for authorizing the holders of these identities to perform specific actions still need additional research and development. While there are a number of proposed standards for authorization structures and protocols such as KeyNote, SPKI, and SAML based on X.509 or other key-based identities, none have been widely adopted. As part of an effort to use X.509 identities to provide authorization in highly distributed environments, we have developed and deployed an authorization service based on X.509 identified users and access policy contained in certificates signed by X.509 identified stakeholders. The major goal of this system, called Akenti, is to produce a usable authorization system for an environment consisting of distributed resources used by geographically and administratively distributed users. Akenti assumes communication between users and resources over a secure protocol such as transport layer security (TLS) to provide mutual authentication with X.509 certificates. This paper explains the authorization model and policy language used by Akenti, and how we have implemented an Apache authorization module to provide Akenti authorization.
引用
收藏
页码:566 / 588
页数:22
相关论文
共 43 条
  • [1] Agarwal D.A., Sachs S.R., Johnston W.E., The reality of collaboratories, Computer Physics Communications, 110, pp. 134-141, (1998)
  • [2] Akenti Certificate Schema, (2003)
  • [3] Alfieri R., Cecchini R., Ciaschini V., Dell'Agnello L., Frohner A., Gianoli A., Lorentey K., Spataro F., VOMS, an authorization system for virtual organizations, 1st European Across Grids Conference, (2003)
  • [4] Apache Software Foundation, (2002)
  • [5] Apache Module Registry, (2002)
  • [6] Apache XML Project, (2002)
  • [7] Arsenault A., Turner S., Internet X.509 Public Key Infrastructure: Roadmap Internet Draft, (2002)
  • [8] Belani E., Vahdat A., Anderson T., Dahlin M., The CRISIS wide area security architecture, Proceedings of the USENIX Security Symposium, (1998)
  • [9] Blaze M., Feigenbaum J., Ioannidis J., Keromytis A., The KeyNote trust management system, version 2, IETF RFC-2704, (1999)
  • [10] Dierks T., Allen C., The TLS protocol, version 1, IETF RFC, 2246, (1999)