23
ROLE-BASED ACCESS CONTROL ON THE WEB LI LINGTAO OCT 14 ,2003

ROLE-BASED ACCESS CONTROL ON THE WEB

Embed Size (px)

DESCRIPTION

ROLE-BASED ACCESS CONTROL ON THE WEB. LI LINGTAO OCT 14 ,2003. CONTENT. BACKGROUND (MAC, DAC) Role-Based Access Control Implementation of the RBAC on the Web. Mandatory Access Control (MAC). - PowerPoint PPT Presentation

Citation preview

Page 1: ROLE-BASED ACCESS       CONTROL ON THE WEB

ROLE-BASED ACCESS CONTROL ON THE WEB

LI LINGTAO OCT 14 ,2003

Page 2: ROLE-BASED ACCESS       CONTROL ON THE WEB

CONTENT

BACKGROUND (MAC, DAC)

Role-Based Access Control

Implementation of the RBAC on the Web

Page 3: ROLE-BASED ACCESS       CONTROL ON THE WEB

Mandatory Access Control (MAC)

MAC ,as defined in the Department of Defense Trusted Computer System Evaluation Criteria, is “A means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects to access information of such sensitivity.”

Page 4: ROLE-BASED ACCESS       CONTROL ON THE WEB

Discretionary Access Control (DAC)

Capabilities Profiles Passwords Protection Bits (UNIX) Access Control List (ACL)

e.g.

file A: (Alice, {r, w}), (Bob, {r}), (Dept {w})

Page 5: ROLE-BASED ACCESS       CONTROL ON THE WEB

Role-Based Access Control (RBAC)

With role-based access control, access decisions are based on the roles that individual users have as part of an organization. Users take on assigned roles (such as doctor, nurse, teller, manager). The process of defining roles should be based on a thorough analysis of how an organization operates and should include input from a wide spectrum of users in an organization.

Page 6: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC Model

Users are associated with role(s) ,e.g., Jacky: doctor. Roles are associated with privileged

operation(s), e.g., doctor: prescribe_drugs, order_tests

A user has access to a privileged operation only if the user has an authorized role which is associated with that privileged operation.

Page 7: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC MODEL

Role Hierarchy

RolesUsers Privileges

Page 8: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC Model :Role Relationships

Roles may be related hierarchically, e.g., surgeon doctor. Roles may have conflict of interest relationships : -- Static Separation of Duties (SSD), e.g.,

comptroller and auditor cannot be authorized for the same user.

--Dynamic Separation of Duties (DSD), e.g., teller and account_holder can be authorized for the same user but cannot both be active.

The number of users authorized for a given role may be limited by the cardinality of that role ,e.g., president has cardinality one.

Page 9: ROLE-BASED ACCESS       CONTROL ON THE WEB

Financial_advisor

Role Relationships Example :Bank

Account_rep Branch_manager Internal_auditorTeller

Account_holder employee Invited_guest

visitor

Page 10: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC on the WWW

Problem: Administrators view organizations in

terms of individuals and their roles. Access to the WWW is enforced by

group and access control list (ACL) mechanisms.

Administrators must map their organizational view to these mechanisms.

Page 11: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC on the WWW

Solution: role based access control Access based on user’s organizational

role , e.g., doctor, nurse ,bank teller Higher level of abstraction compared to

commonly used access control mechanisms , e.g., MLS

An administrator’s organizational view IS the access control mechanism.

=> RBAC valuable for “intra-net” enterprise use of WWW

Page 12: ROLE-BASED ACCESS       CONTROL ON THE WEB

Security Administration with RBAC

For each role :assign privileges operations, e.g., Doctor: prescribe_drugs ,order_tests

To give privileges to a user :assign role(s) to user , e.g., Mike: broker, manager, cheat.

To remove a user’s privileges : remove role(s) from user, e.g., Mike: cheat

Page 13: ROLE-BASED ACCESS       CONTROL ON THE WEB

Goals for RBAC on the WWW

Implementation of RBAC on the WWW (RBAC/Web).

RBAC conformance test assertions, i.e., abstract test suite.

Testing software to validate RBAC/Web conformance to test assertions.

Page 14: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Implementation Uses existing WWW technology. Can be used with any browser. Can be used with any authentication

mechanism, e.g., SSL, SHTTP, PCT. Privileged operations are HTTP methods,

e.g., GET, POST, PUT. Available for Unix (e.g., Netscape,

Apache) and Windows NT (e.g., IIS, Website)

Page 15: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Component

Unix & NT: Database Definition

Admin Tool Database Server Session Manager Unix Only: API Library

CGI

Page 16: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Database Definition

Data sets which specify: Association between users and their roles. Role hierarchy. SSD relationships. DSD relationships. ARSs ( active role sets ) Association between WWW server files,

HTTP methods ,and roles.

Page 17: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Admin Tool

Accessed by means of a WWW browser.

Creates users and roles . Associates users with roles and

roles with HTTP methods applies to files .

Specifies roles relationships, i.e., hierarchy, SSD, DSD.

Page 18: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Database Server

Hosts the authoritative copies of the data sets defining users ,roles ,and role relationships.

Notifies WWW servers to update their cached of these data sets when authoritative copies change.

Page 19: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Session Manager

Manages the RBAC Session.

Creates and removes users’ active role sets.

Page 20: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web API Library

C and Perl Library Used by WWW servers and CGIs to

access the RBAC/Web Database . Some WWW servers ,e.g.,

Netscape ,Apache, need not be recompiled.

Page 21: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web CGI

Implements RBAC on the WWW as a CGI.

Existing WWW servers need not be modified.

Page 22: ROLE-BASED ACCESS       CONTROL ON THE WEB

RBAC/Web Use

browser

establish RBAC session

present ARS choices

choose ARS

userSession established

URL

response

web server

RBACDatabase(cached)

Page 23: ROLE-BASED ACCESS       CONTROL ON THE WEB

References

J. Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrila, , D.R. Kuhn, "Role Based Access Control for the World Wide Web" , 20th National Computer Security Conference (1997)

J. Barkley, D.R. Kuhn, L. Rosenthal, M. Skall, A.V. Cincotta, "Role-Based Access Control for the Web" , CALS Expo International & 21st Century Commerce 1998: Global Business Solutions for the New Millennium

(1998).