Skip to main content
Article thumbnail
Location of Repository

Implementing Role Based Access Controls using X.509 Privilege Management - the PERMIS Authorisation Infrastructure

By David W. Chadwick and Alexander Otenko

Abstract

This paper describes the PERMIS role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users roles. Users roles can be assigned by multiple widely distributed management authorities (called Attribute Authorities in X.509), thereby easing the burden of management. All the ACs can be stored in one or more LDAP directories, thus making them widely available. The PERMIS distribution includes a Privilege Allocator GUI tool, and a bulk loader tool, that allow administrators to construct and sign ACs and store them in an LDAP directory ready for use by the PERMIS decision engine. All access control decisions are driven by an authorization policy, which is itself stored in an X.509 AC, thus guaranteeing its integrity and trustworthiness. Authorization policies are written in XML according to a DTD that has been published at XML.org. A user friendly policy management tool is also being built that will allow non- technical managers to easily specify PERMIS authorisation policies. The access control decision engine is written in Java and has both a Java API and SAML-SOAP interface, allowing it to be called either locally or remotely. The Java API is simple to use, comprising of just 3 methods and a constructor. The SAML-SOAP interface conforms to the OASIS SAMLv1.1 specification, as profiled by a Global Grid Forum draft standard, thus making PERMIS suitable as an authorisation server for Grid applications

Topics: QA76
Publisher: IOS Press
Year: 2004
OAI identifier: oai:kar.kent.ac.uk:14043

Suggested articles

Citations

  1. (2002). An Internet Attribute Certificate Profile for Authorization”, RFC 3281,
  2. (2000). Generic Authorization and Access control Application Program Interface C-bindings”
  3. (1995). ISO/IEC 10181-3:1996 “Security Frameworks for open systems: Access control framework”
  4. (1997). ISO/IEC 8824-1:1998, Information Technology - Abstract Syntax Notation One (ASN.1): Specification of Basic Notation doi
  5. (1997). Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names",
  6. (2002). OASIS eXtensible Access Control Markup Language (XACML)” v1.0, doi
  7. (2002). OASIS eXtensible Access Control Markup Language (XACML)” v1.0, 12 doi
  8. On specifying security policies for web documents with an XML-based language”. doi
  9. (2001). Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure”.
  10. (2003). Policy Based Electronic Transmission of Prescriptions". doi
  11. (2002). RBAC Policies in XML for X.509 Based Privilege Management” doi
  12. Rec. X.509 (2001) The Directory: Public-key and attribute certificate frameworks
  13. (1996). Role Based Access Control Models”. doi
  14. (2001). Role-Based Access Control on the Web”, doi
  15. (1999). The KeyNote Trust-Management System Version 2”, RFC 2704,
  16. (2000). The NIST Model for Role Based Access Control: Towards a Unified Standard”. doi
  17. (2000). The Open Group. “Authorization (AZN) API”,
  18. (2002). The PERMIS X.509 Role Based Privilege Management Infrastructure”, doi
  19. (2001). The Ponder Policy Specification Language”, doi
  20. (1999). Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations”. Macmillan Technical Publishing,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.