Authorization Policy in A PKI Environment
Authorization Policy in A PKI Environment
Mary Thompson
Srilekha Mudumbai
Abdelilah Essiari
Willie Chin
Lawrence Berkeley National Laboratory
Distributed Environments
Emphasize usability
Authorization Models
Access Control
Capability
Akenti Authorization
Emphasis on usability
Usability is critical:
Certificate Management
DN
Client
Fetch
Certificate
Resource
Server
Akenti
Identity (X509)
certificate on behalf
of the user.
DN
DN
Internet
Log
Server
DN
Identity certificates
LDAP
Database
Server
Web
Server
Certificate Servers
File
Servers
S1
S2
S3
S4
Certificate
Generator
C4(S4)
C1(S1)
C2(S2)
C3(S3)
Certificate Servers
Akenti
Hash
Generator
Required Infrastructure
Web servers
LDAP servers
NIST PKI workshop
Mod-Akenti
Replaces mod-authorization
Vulnerabilities
Attribute Certificates
Shibboleth
Internet2 Project
Globus Project
Experience
Trust Models
CAS model
Limit actions
Audit actions
Revoke trust in a timely fasion
NIST PKI workshop
Future Directions
Conclusions