Module-4.2 0
Module-4.2 0
2
Access Control Concepts
Access control
Assumptions
System knows who the user is
Authentication via name and password, other credentials
Access requests pass through gatekeeper (reference monitor)
System must not allow monitor to be bypassed
Reference
User monitor
proces
s access request ? Resourc
e
policy
Access Control Terminology (continued)
Access Control Terminology
Access Control Models
(continued)
Access control matrix
[Lampson] Objects
Two variations
store row of matrix with user, under OS control
unforgeable ticket in user space
User U Capabilty c
Process R Process R
ACL vs Capabilities
Delegation
Cap: Process can pass capability at run time
ACL: Try to get owner to add permission to list?
More common: let other process act under current user
Revocation
ACL: Remove user or group from list
Cap: Try to get capability back from process?
Possible in some systems if appropriate bookkeeping
OS knows which data is capability
If capability is used for multiple resources, have to revoke all or none
Indirection: capability points to pointer to resource
If C P R, then revoke capability C by setting P=0
Roles (aka Groups)
Role = set of users
Administrator, PowerUser, User, Guest
Assign permissions to roles; each user gets permission
Role hierarchy
Administrator
Partial order of roles
Each role gets PowerUser
permissions of roles below
User
List only new permissions
given to each role Guest
Role-Based Access Control
Individuals Roles Resources
engineering Server 1
marketing Server 2
Server 3
human res