Efficient Implementation of Entity On-Boarding and Authentication in Zero-Trust Systems

被引:0
作者
Rana, Jayashree [1 ]
Meher, Pramod Kumar [1 ]
Priyadarshini, Rojalina [1 ]
Rao, K. Pratyush [1 ]
机构
[1] CV Raman Global Univ, Dept Comp Sci & Engn, Bhubaneswar 752054, Odisha, India
来源
2024 IEEE INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS, PKIA 2024 | 2024年
关键词
Zero-trust; Zero-trust architecture; Authentication; Public key infrastructure; Digital certificate;
D O I
10.1109/PKIA62599.2024.10728784
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The zero-trust security model enhances enterprise security through proactive and real-time security strategies. It assumes that no entities within or outside the network are inherently trustworthy. Therefore, the authentication of users is given strong importance in a zero-trust system, such that, only authenticated entities can be allowed access to any of the resources of a zero-trust system. Very often, during the authentication process, verification of the digital certificates of the entities is considered indispensable. In this paper, we illustrate how the entities are registered and on-boarded into a zero-trust system using an integrated approach by the Public Key Infrastructure (PKI) and Identity and Access Management System (IAMS). The IAMS in a zero trust system can maintain the user attributes and credentials to offload some of the activities of registration authority in the PKI. We emphasize the generation of a digital certificate for the user during the registration process. Therefore, we have demonstrated the simple steps for building a Certificate Authority (CA) of the PKI of zero trust system using the Open Source Secure Sockets Layer (OpenSSL) tool, which generates the digital certificate for valid users/devices during the registration or entity onboarding. Besides, we demonstrate the authentication based on the digital certificate in the zero trust system by the Policy Enforcement Point (PEP) using its IAMS and authentication server. We show here the effectiveness of a coordinated and integrated PKI, AIMS, and PEP in user/entity onboarding, digital certificate generation, and authentication for a zero-trust system.
引用
收藏
页数:6
相关论文
共 10 条
[1]  
Adams C., 2003, Understanding PKI: concepts, standards, and deployment considerations
[2]   Comparing Password Management Software Toward Usable and Secure Enterprise Authentication [J].
Arias-Cabarcos, Patricia ;
Marin, Andres ;
Palacios, Diego ;
Almenarez, Florina ;
Diaz-Sanchez, Daniel .
IT PROFESSIONAL, 2016, 18 (05) :34-40
[3]   Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust [J].
Buck, Christoph ;
Olenberger, Christian ;
Schweizer, Andre ;
Volter, Fabiane ;
Eymann, Torsten .
COMPUTERS & SECURITY, 2021, 110
[4]  
Dastres R., 2021, International Journal of Information Sciences and Computer Engineering
[5]   A Survey on Zero Trust Architecture: Challenges and Future Trends [J].
He, Yuanhang ;
Huang, Daochao ;
Chen, Lei ;
Ni, Yi ;
Ma, Xiangjie .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[6]   PKI and digital certification infrastructure [J].
Hunt, R .
NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, :234-239
[7]  
Kerman A., 2020, Implementing a zero-trust architecture
[8]  
Saleem M.B., 2021, European Journal of Molecular Clinical Medicine, V7, P2437
[9]  
Slagell A., 2006, COMPUTING COMMUNICAT
[10]  
Stafford V., 2020, NIST Special Publication, V800-207