Upload
leon-chandler
View
217
Download
0
Embed Size (px)
Citation preview
By: Nikhil Bendre
Gauri Jape
What is Identity?
Digital Identity
Attributes Role Relationship
Authentication◦ Who wants to access the system?
Authorization◦ Defining the rights to access
IDAM
Streamlines the access to resources
Reduces the wastage of time
Efficient Provisioning
Reduces Administrative Cost
Single Password
Ensures greater user productivity
Software Engineering
Architecture
Scalability
Need to standardize IDAM
Composed of◦ Subjects◦ Objects◦ Access rights
Types◦ ACL◦ RBAC◦ ABAC◦ CWAC
Access Control List
Consists of list of subjects & objects with the access rights
Example◦ acl(file 1) = { (process 1, {read, write, own}),
(process 2 {append}) } ◦ acl(process 1) = { (process 1, {read, write,
execute, own}), (process 2, {read}) }
Role Based Access Control
Consists of◦ Group of users based on roles◦ Permissions to roles
Supports revocation of access
High level specification possible
Attributes Based Access Control
◦ Grants access to the entities based on attributes
Context Aware Access Control
◦ Access based on surrounding context of subjects or objects
Both Support High Level Specification
Property of access control
Single Login In
Total Access to System
Examples◦ One Time Password◦ Smart Cards
New token structure
Conference key mechanism◦Secure way between service provider & identity provider
Service token mechanism for IDAM
IDAM
Access Control Models
Single Sign On
Sourceld Liberty