Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Access Control: Understanding XACML for Resource Protection, Slides of Information Security and Markup Languages

An overview of access control, focusing on xacml (extensible access control markup language). Learn about xacml's components, advantages, and limitations, as well as its practical implementation. Understand how xacml policies, requests, and responses work, and explore related topics and tools.

Typology: Slides

2011/2012

Uploaded on 07/17/2012

panita
panita 🇮🇳

4.8

(6)

43 documents

1 / 42

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Access Control
What is it?
Why is it needed?
Privacy
General Terms
docsity.com
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a

Partial preview of the text

Download Access Control: Understanding XACML for Resource Protection and more Slides Information Security and Markup Languages in PDF only on Docsity!

^ Access Control^ ◦^ What is it?^ ◦^ Why is it needed?^ ◦^ Privacy^ ◦^ General Terms

^ XACML^ ◦^ About^ ◦^ General Usage Scenario^ ◦^ Advantages and Limitations^ ◦^ Structure^ ^ Components^ ^ Request^ ^ Policies^ ^ Response^ ◦^ Practical Implementation

CodersGroup 1^ Coders CodersGroup 3Group 2

^ Consider^

three^ usergroups who^ mustshare resourcesamongst themselves.

^ Requirement

of^ a

generic^ method

to

address^

such

situations where datamust^ be^ shared

and

also^ hidden

from

other^ users

for

various reasons.

^ Consider^

the

hierarchal^

structure

of an organization.  Different members ofdifferent groups haveaccess^ to^

different

amounts of data.  Again such access toresources^

must^ be

cleverly dealt with.

CEO Manager System Analyst Coder

^ Anaccess control policy can be transformedinto^ aprivacy

aware^ access

control^ policy

with^ the^

association

of^ the^

following

parameters:^ ◦^ Intent or Purpose for access against each resource.^ ◦^ Obligations to be fulfilled on access to certain dataresources^ ◦^ Data Retention Periods.

^ Let us formally define some terms now: ^ Official Definition:^ ◦^ Resource - Data, service or system component ^ Examples:^ ◦^ User Folders in a shared File System^ ◦^ Service to send emails^ ^ Some are allowed to use the service^ ^ Some are not.

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definition:^ ◦^ Action- An operation on a resource. ^ Examples:^ ◦^ View^ ◦^ Create^ ◦^ Update^ ◦^ Delete

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definition:^ ◦^ Environment - The set of attributes that are relevantto an authorization decision and are independent of aparticular subject, resource or action ^ Examples:^ ◦^ Time of Day^ ◦^ IP address

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definition:^ ◦^ Attribute^

-^ Characteristic

of^ a^ subject,
resource,
action or environment that may be referenced
in a

predicate or target.  Examples: ◦ Resource Attribute –^ ^ resource-id –^ ^ “hospital.patient.xray_report”

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definition:^ ◦^ Attribute^

-^ Characteristic

of^ a^ subject,
resource,
action or environment that may be referenced
in a

predicate or target.  Examples: ◦ Action Attribute –^ ^ action-id^ ^ “edit”

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definition:^ ◦^ Attribute^

-^ Characteristic

of^ a^ subject,
resource,
action or environment that may be referenced
in a

predicate or target.  Examples: ◦ Environment Attribute –^ ^ time^ ^ “9:30 p.m.”

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ Official Definitions:^ ◦^ Policy decision point (PDP) - The system entitythat evaluates applicable policy and renders anauthorization decision.^ ◦^ Policy enforcement point (PEP) - The system entitythat performs access control, by making decisionrequests and enforcing authorization decisions.

eXtensible Access Control MarkupLanguage^ (XACML)

Version^ 2. documentation.

^ From^ here

onwards^

when^ we^

talk^ about

access control we automatically imply privacyaware access control.

http://dev2dev.bea.com/pub/a/2004/02/xacml.html

^ XACML^ defines

a^ general

policy^ language

used to protect resources as well as an accessdecision language.  Markup^ language

has^ been

approved

and

standardized by OASIS.

http://dev2dev.bea.com/pub/a/2004/02/xacml.html