ACWP Generic Model for AC

From IHE Wiki
Revision as of 16:58, 18 January 2009 by Joerg.caumanns (talk | contribs)
Jump to navigation Jump to search

IHE White Paper on Access Control

Generic Model for Access Control

  • PEP, PDP, PIP, and PAP are generic building blocks for an access control solution
  • each of these blocks might appear in different instances (e. g. PIP for the management of subject attributes vs. PIP fpr the management of resource attributes)

Access Control Systems

  • An Access Control System (ACS) is a (logical) capsule around all authorization subsystem components that are (logically) linked with a node
    • Management of Policies and Attributes
    • Policy Decision and Policy Enforcement
    • Security Token issuing and verification (for ACS federation)
  • For discussing and evaluating access control solutions, a model is needed that is independent from the deployment of the ACS components at (pysiclal) nodes
  • Therefore we use a model of domains where each domain is autonomous and contains its own ACS. DOmains can be mapped onto nodes in a n:1 manner.
  • In the simplest case three domains are modelled: context domain, subject domain, and resource domain

Context Domain

  • issuer of a request affecting a protected resource
  • management of context attributes
  • management of local policies (e. g. SoD)
  • activation of functional roles
  • control of the assertion/message flow
  • PEP/PDP for the enforcement of local policies (e. g. for constraints on role activation)

Domain 2: Subject Domain

  • (in XSPA part of the issuing domain)
  • Subject authentication
  • Management of subject attributes

Domain 3: Resource Domain

  • management of protected resources (e. g. data base)
  • management of resource attributes
  • management of resource security policies
  • policy enforcement and policy decision

Discussion

place issues to be discussed among the editorial team here...

Change Requests

place your change requests here...