Federated Authorisation and Group Management in e-Science
نویسندگان
چکیده
The power of federated identity and access management is not just simplified authentication but the ability to make authorisation decisions based on a range of attributes. In an increasingly inter-federated world, how can we present and manage authorisations across different federated services in a consistent and uniform way with minimal overhead for each of the parties involved (service providers, identity providers, users)? If this would be done through a centralised service, which party would offer this service? How to assure unambiguous attribute interpretation in and across federations? How to manage groups of users that do not always fit in the same organisational mould? Does the user have a say in the release of attributes?
منابع مشابه
Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML
Internationally, the need for federated Identity & Access Management continues to grow, as it allows users to get Single Sign-On access to external resources (a.k.a. Service Providers) using their home account and some attributes that are being released securely by their home organization (a.k.a. Identity Providers). In other words, it solves the problem of service providers needing to create a...
متن کاملGrid Services Supporting the Usage of Secure Federated, Distributed Biomedical Data
The BRIDGES project is a UK e-Science project that provides grid based support for biomedical research into the genetics of hypertension – the Cardiovascular Functional Genomics Project (CFG). Its main goal is to provide an effective environment for CFG, and biomedical research in general, including access to integrated data, analysis and visualization, with appropriate authorisation and privac...
متن کاملUsing the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources
The emergence of computational and data grids has led to resources within a single organisation being exposed to other users within a ‘virtual organisation’ (VO) that encompasses a dynamic distributed infrastructure. Due to this dynamic nature of VOs, there is a need for an infrastructure to facilitate the management of the constituent users and resources. We have been developing an easy to use...
متن کاملSynchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider this a pull authorisation strategy: the authorisation decision reflects the current and/or past authorisations. In this paper, we examine this pull strategy and propose an alternative form of authorisation in a distribute...
متن کاملAuthorisation Subterfuge by Delegation in Decentralised Networks
Trust Management [1, 4, 10] is an approach to constructing and interpreting the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic credentials are used to specify delegation of authorisation among public keys. Existing trust management schemes are operational in nature, defining security in terms of specific controls such as delegation chains...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011