Changes between Version 3 and Version 4 of SecurityIssuesFirstDay
- Timestamp:
- 2008/02/12 12:09:15 (17 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
SecurityIssuesFirstDay
v3 v4 7 7 8 8 Scenary: Dynamic access control & secure management over federated resources. 9 10 Simplified use case: 11 · After registration the user connects to the portal and creates delegated credentials on a MyProxy repository. Delegation is achieved by the use of so called proxy credentials. 12 · Through the portal the end user uses the different services (including WFs). When a service is called, the user is authenticated through the proxy certificates managed by the MyProxy service. 13 · Services can depend on a central authorisation service to determine whether or not the user is allowed to perform a certain operation or whether he is allowed to see specific data. 14 · Services offering access to sensitive data should do additional authorisation decision requests to some Authorization Service that implements the Data Protection policies and governs the flow of private datasets. 15 16 17 18 9 19 * '''Resources protection:''' software (services, WFs, …) availability, computational resources (CPU, storage, …); data access restrictions 10 20 * '''Protection / Sharing of proprietary data''' (in a persistence system). … … 19 29 * Authorization levels 20 30 * Interchanging protocols (formats) 21 * Authentication protocols 31 * Authentication & delegation: Authentication, both of end-user and of infrastructure components, could based on X509 digital certificates. This proven technology is commonly used, for example when connecting to a secure website (https). Certificates are managed through a Public Key Infrastructure (PKI), which deals with the secure creation, validation and revocation of certificates. 32 22 33 * WFs concerns 23 34 * Profiling offer deployment (specific to the user rights)